Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-13464

Опубликовано: 09 июл. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
modsecurity-crsfixed3.2.0-1package
modsecurity-crsno-dsastretchpackage
modsecurity-crsnot-affectedjessiepackage

Примечания

  • https://github.com/SpiderLabs/owasp-modsecurity-crs/commit/6090d6b0a90417f1a60aa68a01eb777cef2e1184

  • https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386

EPSS

Процентиль: 46%
0.00237
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.

CVSS3: 7.5
nvd
больше 6 лет назад

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.

EPSS

Процентиль: 46%
0.00237
Низкий