CVE-2022-48279

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
References
Link Resource
https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ Not Applicable
https://github.com/SpiderLabs/ModSecurity/pull/2795 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/pull/2797 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 Release Notes Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/
https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ Not Applicable
https://github.com/SpiderLabs/ModSecurity/pull/2795 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/pull/2797 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 Release Notes Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*
cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:33

Type Values Removed Values Added
Summary
  • (es) En ModSecurity anterior a 2.9.6 y 3.x anterior a 3.0.8, las solicitudes HTTP multiparte se analizaban incorrectamente y podían omitir el Firewall de aplicaciones web. NOTA: esto está relacionado con CVE-2022-39956, pero puede considerarse cambios independientes en el código base de ModSecurity (lenguaje C).
References () https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ - Not Applicable () https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ - Not Applicable
References () https://github.com/SpiderLabs/ModSecurity/pull/2795 - Patch, Third Party Advisory () https://github.com/SpiderLabs/ModSecurity/pull/2795 - Patch, Third Party Advisory
References () https://github.com/SpiderLabs/ModSecurity/pull/2797 - Patch, Third Party Advisory () https://github.com/SpiderLabs/ModSecurity/pull/2797 - Patch, Third Party Advisory
References () https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 - Release Notes, Third Party Advisory () https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 - Release Notes, Third Party Advisory
References () https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 - Release Notes, Third Party Advisory () https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 - Release Notes, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/ -

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-269 CWE-436

22 Apr 2023, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-20 19:15

Updated : 2024-11-21 07:33


NVD link : CVE-2022-48279

Mitre link : CVE-2022-48279

CVE.ORG link : CVE-2022-48279


JSON object : View

Products Affected

trustwave

  • modsecurity

debian

  • debian_linux
CWE
CWE-436

Interpretation Conflict