Lucene search

K
cve[email protected]CVE-2022-39955
HistorySep 20, 2022 - 7:15 a.m.

CVE-2022-39955

2022-09-2007:15:12
CWE-863
web.nvd.nist.gov
59
6
owasp
modsecurity
crs
cve-2022-39955
security
vulnerability
bypass
http
content-type
charset
encoding
backend
exploit
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.6%

The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type “charset” names and therefore bypassing the configurable CRS Content-Type header “charset” allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.

Affected configurations

NVD
Node
owaspowasp_modsecurity_core_rule_setRange3.0.03.2.2
OR
owaspowasp_modsecurity_core_rule_setRange3.3.03.3.3
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
Node
debiandebian_linuxMatch10.0

CNA Affected

[
  {
    "vendor": "OWASP",
    "product": "ModSecurity Core Rule Set",
    "versions": [
      {
        "version": "3.0.x",
        "status": "affected"
      },
      {
        "version": "3.1.x",
        "status": "affected"
      },
      {
        "version": "unspecified",
        "lessThanOrEqual": "3.2.1",
        "status": "affected",
        "versionType": "custom"
      },
      {
        "version": "unspecified",
        "lessThanOrEqual": "3.3.2",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

85.6%