CVE-2007-1359

Publication date 8 March 2007

Last updated 24 July 2024


Ubuntu priority

Description

Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python.

Read the notes from the security team

Status

Package Ubuntu Release Status
libapache-mod-security 11.04 natty
Not affected
10.10 maverick
Not affected
10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy Not in release
7.04 feisty Not in release
6.10 edgy Ignored end of life, was needed
6.06 LTS dapper Ignored end of life

Notes


mdeslaur

PoC: http://www.php-security.org/MOPB/BONUS-12-2007.html

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libapache-mod-security

Access our resources on patching vulnerabilities