Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-48279

Опубликовано: 20 янв. 2023
Источник: redhat
CVSS3: 7.5

Описание

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.

A vulnerability was found in ModSecurity. This issue occurs when HTTP multipart requests are incorrectly parsed and could bypass the Web Application Firewall. NOTE: This is related to CVE-2022-39956, but can be considered independent changes to the ModSecurity (C language) codebase.

Отчет

Red Hat rates this vulnerability as Moderate impact as a result of how mod_security is configured to be used in Red Hat products. When running with default configurations the affected program will have limited privileges and thus the impact of this flaw will be restricted beyond what the Web Application Firewall is also restricting.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7mod_securityOut of support scope
Red Hat Enterprise Linux 8mod_securityWill not fix
Red Hat Enterprise Linux 9mod_securityWill not fix
Red Hat Software Collectionshttpd24-mod_securityWill not fix
JBoss Core Services for RHEL 8jbcs-httpd24-mod_securityFixedRHSA-2023:462915.08.2023
JBoss Core Services on RHEL 7jbcs-httpd24-mod_securityFixedRHSA-2023:462915.08.2023
Text-Only JBCSmod_securityFixedRHSA-2023:462815.08.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1389
https://bugzilla.redhat.com/show_bug.cgi?id=2163622mod_security: incorrect parsing of HTTP multipart requests leads to web application firewall bypass

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.

CVSS3: 7.5
nvd
около 3 лет назад

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.

CVSS3: 7.5
debian
около 3 лет назад

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart reque ...

suse-cvrf
около 3 лет назад

Security update for apache2-mod_security2

suse-cvrf
около 3 лет назад

Security update for apache2-mod_security2

7.5 High

CVSS3