First published: Fri Sep 02 2022(Updated: )
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owasp Owasp Modsecurity Core Rule Set | =3.2.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-22669.
The severity of CVE-2020-22669 is critical with a severity value of 9.8.
The affected software for CVE-2020-22669 is Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) and Debian Linux 10.0.
CVE-2020-22669 allows attackers to use comment characters and variable assignments in SQL syntax to bypass Modsecurity WAF protection and perform SQL injection attacks on web applications.
Yes, you can find more information about CVE-2020-22669 in the following references: [link1], [link2], [link3].