CVE-2009-5031

NameCVE-2009-5031
DescriptionModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
modsecurity-apache (PTS)jessie, jessie (lts)2.8.0-3+deb8u2fixed
stretch (security)2.9.1-2+deb9u1fixed
stretch (lts), stretch2.9.1-2+deb9u2fixed
buster (security), buster, buster (lts)2.9.3-1+deb10u2fixed
bullseye2.9.3-3+deb11u2fixed
bullseye (security)2.9.3-3+deb11u1fixed
bookworm2.9.7-1fixed
sid, trixie2.9.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libapache-mod-securitysource(unstable)2.5.12-1
modsecurity-apachesource(unstable)(not affected)

Notes

- modsecurity-apache <not-affected> (Fixed before initial upload)
https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366
https://www.openwall.com/lists/oss-security/2012/06/22/1
https://www.openwall.com/lists/oss-security/2012/06/22/2

Search for package or bug name: Reporting problems