Lucene search

K
amazonAmazonALAS-2023-1772
HistoryJun 21, 2023 - 7:11 p.m.

Medium: mod24_security

2023-06-2119:11:00
alas.aws.amazon.com
15
modsecurity
http
multipart requests
parsing
vulnerability
cve-2022-48279
fix
update
yum
packages
red hat
mitre
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.5%

Issue Overview:

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase. (CVE-2022-48279)

Affected Packages:

mod24_security

Issue Correction:
Run yum update mod24_security to update your system.

New Packages:

i686:  
    mod24_security-2.8.0-5.28.amzn1.i686  
    mlogc24-2.8.0-5.28.amzn1.i686  
    mod24_security-debuginfo-2.8.0-5.28.amzn1.i686  
  
src:  
    mod24_security-2.8.0-5.28.amzn1.src  
  
x86_64:  
    mod24_security-debuginfo-2.8.0-5.28.amzn1.x86_64  
    mod24_security-2.8.0-5.28.amzn1.x86_64  
    mlogc24-2.8.0-5.28.amzn1.x86_64  

Additional References

Red Hat: CVE-2022-48279

Mitre: CVE-2022-48279

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

75.5%