Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
References
Configurations
History
02 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/SpiderLabs/ModSecurity/pull/2857/commits/4324f0ac59f8225aa44bc5034df60dbeccd1d334 - Patch | |
References | () https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7 - Release Notes | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html - Mailing List, Third Party Advisory | |
References | () https://github.com/SpiderLabs/ModSecurity/pull/2857 - Issue Tracking, Patch |
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
22 Apr 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-01-20 19:15
Updated : 2025-04-02 17:15
NVD link : CVE-2023-24021
Mitre link : CVE-2023-24021
JSON object : View
Products Affected
debian
- debian_linux
trustwave
- modsecurity
CWE