CVE-2022-39957Protection Mechanism Failure in Modsecurity Core Rule SET

Severity
7.5HIGHNVD
EPSS
0.1%
top 75.33%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 20
Latest updateSep 21

Description

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently su

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5owasp/modsecurity_core_rule_setunspecified3.2.1+2
debiandebian/modsecurity-crs< modsecurity-crs 3.3.4-1 (bookworm)

Also affects: Debian Linux 10.0, Fedora 35, 36, 37

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cxqq-h5hh-jgq2: The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass2022-09-21
OSV
CVE-2022-39957: The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass2022-09-20

📋Vendor Advisories

2
Red Hat
mod_security_crs: Charset accept header field resulting in response rule set bypass2022-09-19
Debian
CVE-2022-39957: modsecurity-crs - The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass....2022
CVE-2022-39957 — Protection Mechanism Failure | cvebase