Incorrect handling of ‘\0’ bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 10.0 | |
modsecurity | lt | 2.9.7 |
github.com/SpiderLabs/ModSecurity/pull/2857
github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334
github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7
lists.debian.org/debian-lts-announce/2023/01/msg00023.html
lists.fedoraproject.org/archives/list/[email protected]/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/
lists.fedoraproject.org/archives/list/[email protected]/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
lists.fedoraproject.org/archives/list/[email protected]/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/