OWASP ModSecurity Core Rule Set up to 3.0.x/3.1.x/3.2.0/3.2.1 HTTP Header Content-Type authorization
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.0 | $0-$5k | 0.00 |
A vulnerability was found in OWASP ModSecurity Core Rule Set up to 3.0.x/3.1.x/3.2.0/3.2.1. It has been declared as critical. Affected by this vulnerability is some unknown processing of the component HTTP Header Handler. The manipulation of the argument Content-Type
with an unknown input leads to a authorization vulnerability. The CWE definition for the vulnerability is CWE-863. The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
The weakness was released 09/20/2022. It is possible to read the advisory at coreruleset.org. This vulnerability is known as CVE-2022-39955 since 09/05/2022. Technical details of the vulnerability are known, but there is no available exploit.
Upgrading to version 3.3.1 or 3.3.2 eliminates this vulnerability.
Product
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.1VulDB Meta Temp Score: 8.0
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CNA Base Score: 7.3
CNA Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: AuthorizationCWE: CWE-863 / CWE-285 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: ModSecurity Core Rule Set 3.3.1/3.3.2
Timeline
09/05/2022 🔍09/20/2022 🔍
09/20/2022 🔍
10/21/2022 🔍
Sources
Advisory: FEDORA-2022-85a85c84b3Status: Confirmed
CVE: CVE-2022-39955 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20130913
Entry
Created: 09/20/2022 12:20Updated: 10/21/2022 09:29
Changes: 09/20/2022 12:20 (49), 10/21/2022 09:25 (1), 10/21/2022 09:29 (11)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.