Логотип exploitDog
bind:CVE-2023-38199
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-38199

Количество 4

Количество 4

ubuntu логотип

CVE-2023-38199

больше 2 лет назад

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2023-38199

больше 2 лет назад

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2023-38199

больше 2 лет назад

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does n ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-662c-vg67-m327

больше 2 лет назад

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not block multiple Content-Type headers, which might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion." This occurs when the web application relies on only the last Content-Type header.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-38199

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-38199

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-38199

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does n ...

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-662c-vg67-m327

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not block multiple Content-Type headers, which might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion." This occurs when the web application relies on only the last Content-Type header.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу