First published: Fri Jan 20 2023(Updated: )
In ModSecurity before 2.9.7, FILES_TMP_CONTENT sometimes lacked the complete content. This can lead to a Web Application Firewall bypass. <a href="https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334">https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334</a> <a href="https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7">https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7</a> <a href="https://github.com/SpiderLabs/ModSecurity/pull/2857">https://github.com/SpiderLabs/ModSecurity/pull/2857</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trustwave ModSecurity | <2.9.7 | |
Debian Debian Linux | =10.0 | |
ubuntu/modsecurity-apache | <2.9.2-1ubuntu0.1~ | 2.9.2-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.3-1ubuntu0.1 | 2.9.3-1ubuntu0.1 |
ubuntu/modsecurity-apache | <2.9.5-1ubuntu0.1~ | 2.9.5-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.0-1ubuntu0.1~ | 2.9.0-1ubuntu0.1~ |
ubuntu/modsecurity-apache | <2.9.7-1 | 2.9.7-1 |
redhat/ModSecurity | <2.9.7 | 2.9.7 |
debian/modsecurity-apache | <=2.9.3-1+deb10u1<=2.9.3-3+deb11u1 | 2.9.3-1+deb10u2 2.9.3-3+deb11u2 2.9.7-1 |
https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24021 is a vulnerability in ModSecurity before 2.9.7 that allows for Web Application Firewall bypasses and buffer over-reads when handling '\0' bytes in file uploads.
CVE-2023-24021 affects ModSecurity versions before 2.9.7, allowing for Web Application Firewall bypasses and buffer over-reads.
The severity of CVE-2023-24021 is medium (CVSS score of 4).
To fix CVE-2023-24021, update ModSecurity to version 2.9.7 or later.
You can find more information about CVE-2023-24021 on the official ModSecurity GitHub page and the provided references.