Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
References
Link | Resource |
---|---|
https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334 | Patch |
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7 | Release Notes |
https://github.com/SpiderLabs/ModSecurity/pull/2857 | Issue Tracking Patch |
https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html | Mailing List Third Party Advisory |
Information
Published : 2023-01-20 11:15
Updated : 2023-03-06 11:14
NVD link : CVE-2023-24021
Mitre link : CVE-2023-24021
JSON object : View
CWE
Products Affected
trustwave
- modsecurity
debian
- debian_linux