7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
69.7%
ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects.
Crafted JSON objects with nesting tens-of-thousands deep could result in
the web server being unable to service legitimate requests. Even a
moderately large (e.g., 300KB) HTTP request can occupy one of the limited
NGINX worker processes for minutes and consume almost all of the available
CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected
versions include 2.8.0 through 2.9.4.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | modsecurity | < any | UNKNOWN |
ubuntu | 22.04 | noarch | modsecurity | < any | UNKNOWN |
ubuntu | 23.10 | noarch | modsecurity | < any | UNKNOWN |
ubuntu | 24.04 | noarch | modsecurity | < any | UNKNOWN |
ubuntu | 18.04 | noarch | modsecurity-apache | < 2.9.2-1ubuntu0.1~esm1 | UNKNOWN |
ubuntu | 20.04 | noarch | modsecurity-apache | < 2.9.3-1ubuntu0.1 | UNKNOWN |
ubuntu | 16.04 | noarch | modsecurity-apache | < 2.9.0-1ubuntu0.1~esm1 | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
69.7%