CVE-2022-48279

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
References
Link Resource
https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ Not Applicable
https://github.com/SpiderLabs/ModSecurity/pull/2795 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/pull/2797 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 Release Notes Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/
https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/ Not Applicable
https://github.com/SpiderLabs/ModSecurity/pull/2795 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/pull/2797 Patch Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6 Release Notes Third Party Advisory
https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8 Release Notes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*
cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-01-20 19:15

Updated : 2025-04-03 19:15


NVD link : CVE-2022-48279

Mitre link : CVE-2022-48279

CVE.ORG link : CVE-2022-48279


JSON object : View

Products Affected

trustwave

  • modsecurity

debian

  • debian_linux
CWE
CWE-436

Interpretation Conflict