In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Modsecurity | Trustwave | * | 2.9.6 (excluding) |
Modsecurity | Trustwave | 3.0.0 (including) | 3.0.8 (excluding) |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs | * |
Text-Only JBCS | RedHat | mod_security | * |
Modsecurity | Ubuntu | kinetic | * |
Modsecurity | Ubuntu | trusty | * |
Modsecurity | Ubuntu | upstream | * |
Modsecurity | Ubuntu | xenial | * |
Modsecurity-apache | Ubuntu | bionic | * |
Modsecurity-apache | Ubuntu | esm-apps/bionic | * |
Modsecurity-apache | Ubuntu | esm-apps/jammy | * |
Modsecurity-apache | Ubuntu | esm-apps/xenial | * |
Modsecurity-apache | Ubuntu | focal | * |
Modsecurity-apache | Ubuntu | jammy | * |
Modsecurity-apache | Ubuntu | kinetic | * |
Modsecurity-apache | Ubuntu | trusty | * |
Modsecurity-apache | Ubuntu | trusty/esm | * |
Modsecurity-apache | Ubuntu | upstream | * |
Modsecurity-apache | Ubuntu | xenial | * |