CVE-2022-39955
Partial rule set bypass in OWASP ModSecurity Core Rule Set by submitting a specially crafted HTTP Content-Type header
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
OWASP ModSecurity Core Rule Set (CRS) está afectado por una omisión parcial del conjunto de reglas al enviar un campo de encabezado HTTP Content-Type especialmente diseñado que indica múltiples esquemas de codificación de caracteres. Un back-end vulnerable puede ser potencialmente explotado declarando múltiples nombres de Content-Type "charset" y, por lo tanto, omitiendo la lista permitida del encabezado Content-Type de CRS. Una carga útil codificada puede omitir la detección de CRS de esta manera y puede ser decodificada por el backend. Las versiones heredadas de CRS 3.0.x y 3.1.x están afectadas, así como las versiones 3.2.1 y 3.3.2 actualmente soportadas. Es recomendado a integradores y usuarios actualizar a versiones 3.2.2 y 3.3.3 respectivamente
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-05 CVE Reserved
- 2022-09-20 CVE Published
- 2024-05-11 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-863: Incorrect Authorization
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Owasp Search vendor "Owasp" | Owasp Modsecurity Core Rule Set Search vendor "Owasp" for product "Owasp Modsecurity Core Rule Set" | >= 3.0.0 < 3.2.2 Search vendor "Owasp" for product "Owasp Modsecurity Core Rule Set" and version " >= 3.0.0 < 3.2.2" | - |
Affected
| ||||||
Owasp Search vendor "Owasp" | Owasp Modsecurity Core Rule Set Search vendor "Owasp" for product "Owasp Modsecurity Core Rule Set" | >= 3.3.0 < 3.3.3 Search vendor "Owasp" for product "Owasp Modsecurity Core Rule Set" and version " >= 3.3.0 < 3.3.3" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 37 Search vendor "Fedoraproject" for product "Fedora" and version "37" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|