Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-39955 CVE-2022-39956 CVE-2022-39957 CVE-2022-39958 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
OWASP ModSecurity Core Rule Set (CRS) Server applications / Other server solutions |
Vendor | OWASP |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU72087
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-39955
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of user-supplied input when parsing HTTP Content-Type header field that indicates multiple character encoding schemes. A remote attacker send a specially crafted HTTP request and bypass the configurable CRS Content-Type header "charset" allow list.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOWASP ModSecurity Core Rule Set (CRS): 3.2.0 - 3.3.3
CPE2.3https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72089
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-39956
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MIME header fields that will not be decoded and inspected by the web application firewall engine and the rule set.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOWASP ModSecurity Core Rule Set (CRS): 3.2.0 - 3.3.3
CPE2.3https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72090
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-39957
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of HTTP Accept header field containing an optional "charset" parameter. A remote attacker can send a specially crafted HTTP request and bypass WAF detection.
Install updates from vendor's website.
Vulnerable software versionsOWASP ModSecurity Core Rule Set (CRS): 3.2.0 - 3.3.3
CPE2.3https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72091
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-39958
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of the HTTP Range header field with a small byte range. A remote attacker can exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range.
MitigationInstall updates from vendor's website.
Vulnerable software versionsOWASP ModSecurity Core Rule Set (CRS): 3.2.0 - 3.3.3
CPE2.3https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.