CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
57.1%
DISPUTED An issue was discovered in OWASP ModSecurity Core Rule Set
(CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows
remote attackers to cause a denial of service (ReDOS) by entering a
specially crafted string with set_error_handler# at the beginning and
nested repetition operators. NOTE: the software maintainer disputes that
this is a vulnerability because the issue cannot be exploited via
ModSecurity.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | modsecurity-crs | < any | UNKNOWN |
ubuntu | 20.04 | noarch | modsecurity-crs | < any | UNKNOWN |
ubuntu | 22.04 | noarch | modsecurity-crs | < any | UNKNOWN |
ubuntu | 24.04 | noarch | modsecurity-crs | < any | UNKNOWN |
ubuntu | 16.04 | noarch | modsecurity-crs | < any | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
57.1%