First published: Tue Sep 20 2022(Updated: )
The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
Credit: vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
OWASP ModSecurity Core Rule Set | >=3.0.0<3.2.2 | |
OWASP ModSecurity Core Rule Set | >=3.3.0<3.3.3 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Debian Debian Linux | =10.0 |
upgrade to 3.2.2 or 3.3.3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ModSecurity Core Rule Set (CRS) vulnerability is CVE-2022-39957.
The severity of CVE-2022-39957 is high with a severity value of 7.5.
The OWASP ModSecurity Core Rule Set (CRS) versions 3.0.0 to 3.2.2 and versions 3.3.0 to 3.3.3 are affected. Fedora versions 35, 36, and 37, as well as Debian Linux version 10.0, are also affected.
An attacker can exploit this vulnerability by issuing an HTTP Accept header field containing an optional "charset" parameter to receive the response in an encoded form.
Yes, patches and updates are available for the affected software. Please refer to the provided references for more information on how to apply the fixes.