First published: Thu Jul 13 2023(Updated: )
coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not block multiple Content-Type headers, which might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion." This occurs when the web application relies on only the last Content-Type header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OWASP ModSecurity Core Rule Set | <=3.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38199 is a vulnerability in coreruleset (aka OWASP ModSecurity Core Rule Set) through version 3.3.4 that allows attackers to bypass a Web Application Firewall (WAF) by using multiple Content-Type request headers.
CVE-2023-38199 has a severity level of critical with a severity value of 9.8.
CVE-2023-38199 affects coreruleset (aka OWASP ModSecurity Core Rule Set) through version 3.3.4 by allowing attackers to bypass the WAF with a crafted payload using multiple Content-Type request headers.
As of now, there is no fix available for CVE-2023-38199. It is recommended to follow the official GitHub issue and pull request for updates.
The CWE ID for CVE-2023-38199 is CWE-843.