A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md | Vendor Advisory |
https://github.com/yoloflz101/yoloflz/blob/main/README.md | Broken Link |
https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/ | Vendor Advisory |
Configurations
History
17 Jun 2025, 15:49
Type | Values Removed | Values Added |
---|---|---|
First Time |
Trustwave modsecurity
Trustwave |
|
CPE | cpe:2.3:a:trustwave:modsecurity:3.0.12:*:*:*:*:*:*:* | |
References | () https://github.com/yoloflz101/yoloflz/blob/main/README.md - Broken Link | |
References | () https://github.com/owasp-modsecurity/ModSecurity/blob/v3/master/README.md - Vendor Advisory | |
References | () https://modsecurity.org/20241011/about-cve-2024-46292-2024-october/ - Vendor Advisory |
21 Oct 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue). | |
References |
|
09 Oct 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 16:15
Updated : 2025-06-17 15:49
NVD link : CVE-2024-46292
Mitre link : CVE-2024-46292
JSON object : View
Products Affected
trustwave
- modsecurity
CWE
No CWE.