Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-48866

Опубликовано: 02 июн. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 7.5

Описание

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The sanitiseArg (and sanitizeArg - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the sanitiseArg (or sanitizeArg) action.

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

released

2.9.2-1ubuntu0.1~esm2
esm-apps/focal

released

2.9.3-1ubuntu0.1+esm1
esm-apps/jammy

released

2.9.5-1ubuntu0.1~esm2
esm-apps/noble

released

2.9.7-1ubuntu0.24.04.1~esm1
esm-apps/xenial

released

2.9.0-1ubuntu0.1~esm2
esm-infra-legacy/trusty

released

2.7.7-2ubuntu0.1~esm2
focal

ignored

end of standard support, was needs-triage
jammy

needed

noble

needed

Показывать по

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
16 дней назад

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action.

CVSS3: 7.5
nvd
16 дней назад

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action.

CVSS3: 7.5
debian
16 дней назад

ModSecurity is an open source, cross platform web application firewall ...

CVSS3: 7.5
fstec
около 1 месяца назад

Уязвимость конфигурации sanitiseArg и sanitizeArg межсетевого экрана для защиты веб-приложений ModSecurity, позволяющая нарушителю вызвать отказ в обслуживании

7.5 High

CVSS3

Уязвимость CVE-2025-48866