Vulnerability Description
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trustwave | Modsecurity | < 2.7.6 |
| Debian | Debian Linux | 7.0 |
References
- http://martin.swende.se/blog/HTTPChunked.htmlExploitThird Party Advisory
- http://www.debian.org/security/2014/dsa-2991Third Party Advisory
- https://github.com/SpiderLabs/ModSecurity/commit/f8d441cd25172fdfe5b613442fedfc0PatchThird Party Advisory
- http://martin.swende.se/blog/HTTPChunked.htmlExploitThird Party Advisory
- http://www.debian.org/security/2014/dsa-2991Third Party Advisory
- https://github.com/SpiderLabs/ModSecurity/commit/f8d441cd25172fdfe5b613442fedfc0PatchThird Party Advisory
FAQ
What is CVE-2013-5705?
CVE-2013-5705 is a vulnerability with a CVSS score of 5.0 (MEDIUM). apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
How severe is CVE-2013-5705?
CVE-2013-5705 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-5705?
Check the references section above for vendor advisories and patch information. Affected products include: Trustwave Modsecurity, Debian Debian Linux.