First published: Fri Jan 20 2023(Updated: )
In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustwave ModSecurity | <2.9.6 | |
Trustwave ModSecurity | >=3.0.0<3.0.8 | |
Debian Debian Linux | =10.0 | |
redhat/ModSecurity | <2.9.6 | 2.9.6 |
redhat/ModSecurity | <3.0.8 | 3.0.8 |
ubuntu/modsecurity | <3.0.8-1 | 3.0.8-1 |
ubuntu/modsecurity-apache | <2.9.5-1ubuntu0.1~ | 2.9.5-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.0-1ubuntu0.1~ | 2.9.0-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.2-1ubuntu0.1~ | 2.9.2-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.3-1ubuntu0.1 | 2.9.3-1ubuntu0.1 |
ubuntu/modsecurity-apache | <2.7.7-2ubuntu0.1~ | 2.7.7-2ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.6-1 | 2.9.6-1 |
debian/modsecurity | <=3.0.3-1+deb10u2<=3.0.4-2 | 3.0.9-1+deb12u1 3.0.12-1 |
debian/modsecurity-apache | <=2.9.3-1+deb10u1<=2.9.3-3+deb11u1 | 2.9.3-1+deb10u2 2.9.3-3+deb11u2 2.9.7-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48279 is a vulnerability found in ModSecurity that allows HTTP multipart requests to be incorrectly parsed, bypassing the Web Application Firewall.
CVE-2022-48279 has a severity rating of 7.5, which is considered high.
ModSecurity versions before 2.9.6 and 3.x before 3.0.8 are affected by CVE-2022-48279.
To fix CVE-2022-48279, upgrade ModSecurity to version 2.9.6 or 3.0.8 or a later version.
Yes, CVE-2022-48279 is related to CVE-2022-39956, but they can be considered independent changes to the ModSecurity codebase.