CVE Vulnerabilities

CVE-2022-48279

Interpretation Conflict

Published: Jan 20, 2023 | Modified: Jul 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.

Weakness

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.

Affected Software

NameVendorStart VersionEnd Version
ModsecurityOwasp3.0.0 (including)3.0.8 (excluding)
ModsecurityTrustwave*2.9.6 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs*
Text-Only JBCSRedHatmod_security*
ModsecurityUbuntufocal*
ModsecurityUbuntukinetic*
ModsecurityUbuntutrusty*
ModsecurityUbuntuupstream*
ModsecurityUbuntuxenial*
Modsecurity-apacheUbuntubionic*
Modsecurity-apacheUbuntuesm-apps/bionic*
Modsecurity-apacheUbuntuesm-apps/focal*
Modsecurity-apacheUbuntuesm-apps/jammy*
Modsecurity-apacheUbuntuesm-apps/xenial*
Modsecurity-apacheUbuntuesm-infra-legacy/trusty*
Modsecurity-apacheUbuntufocal*
Modsecurity-apacheUbuntujammy*
Modsecurity-apacheUbuntukinetic*
Modsecurity-apacheUbuntutrusty*
Modsecurity-apacheUbuntutrusty/esm*
Modsecurity-apacheUbuntuupstream*
Modsecurity-apacheUbuntuxenial*

References