Логотип exploitDog
bind:CVE-2025-29914
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-29914

Количество 2

Количество 2

nvd логотип

CVE-2025-29914

11 месяцев назад

OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-q9f5-625g-xm39

11 месяцев назад

OWASP Coraza WAF has parser confusion which leads to wrong URI in `REQUEST_FILENAME`

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-29914

OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.

CVSS3: 5.4
0%
Низкий
11 месяцев назад
github логотип
GHSA-q9f5-625g-xm39

OWASP Coraza WAF has parser confusion which leads to wrong URI in `REQUEST_FILENAME`

CVSS3: 5.4
0%
Низкий
11 месяцев назад

Уязвимостей на страницу