First published: Fri Nov 05 2021(Updated: )
OWASP ModSecurity Core Rule Set 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.2 is affected by a Request Body Bypass via a trailing pathname.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Owasp Owasp Modsecurity Core Rule Set | >=3.1.0<3.1.2 | |
Owasp Owasp Modsecurity Core Rule Set | >=3.2.0<3.2.1 | |
Owasp Owasp Modsecurity Core Rule Set | >=3.3.0<3.3.2 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-35368 is critical with a severity value of 9.8.
CVE-2021-35368 affects OWASP ModSecurity Core Rule Set versions 3.1.x before 3.1.2, 3.2.x before 3.2.1, and 3.3.x before 3.3.2.
The vulnerability in CVE-2021-35368 is a Request Body Bypass via a trailing pathname.
OWASP ModSecurity Core Rule Set versions 3.1.x, 3.2.x, and 3.3.x are affected by CVE-2021-35368, as well as Fedora 36, Fedora 37, and Debian Linux 10.0.
To fix CVE-2021-35368, update OWASP ModSecurity Core Rule Set to version 3.1.2, 3.2.1, or 3.3.2 and apply any available patches or updates for the affected software.