CVE-2021-45098
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
Se ha detectado un problema en Suricata versiones anteriores a 6.0.4. Es posible omitir/evadir cualquier firma basada en HTTP al falsificar un paquete RST TCP con opciones TCP aleatorias del md5header desde el lado del cliente. Después del handshake de tres vías, es posible inyectar un RST ACK con una opción TCP md5header aleatoria. Entonces, el cliente puede enviar una petición HTTP GET con una URL prohibida. El servidor ignorará el RST ACK y enviará el paquete HTTP de respuesta para la petición del cliente. Estos paquetes no desencadenarán una acción de rechazo de Suricata
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-16 CVE Reserved
- 2021-12-16 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-08-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/OISF/suricata/releases | Release Notes |
URL | Date | SRC |
---|---|---|
https://redmine.openinfosecfoundation.org/issues/4710 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df | 2022-01-04 |
URL | Date | SRC |
---|---|---|
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 | 2022-01-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oisf Search vendor "Oisf" | Suricata Search vendor "Oisf" for product "Suricata" | < 6.0.4 Search vendor "Oisf" for product "Suricata" and version " < 6.0.4" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|