Incorrect handling of 0 bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Modsecurity | Trustwave | * | 2.9.7 (excluding) |
JBoss Core Services for RHEL 8 | RedHat | jbcs-httpd24-mod_security-0:2.9.3-29.el8jbcs | * |
JBoss Core Services on RHEL 7 | RedHat | jbcs-httpd24-mod_security-0:2.9.3-29.el7jbcs | * |
Text-Only JBCS | RedHat | mod_security | * |
Modsecurity-apache | Ubuntu | bionic | * |
Modsecurity-apache | Ubuntu | esm-apps/bionic | * |
Modsecurity-apache | Ubuntu | esm-apps/jammy | * |
Modsecurity-apache | Ubuntu | esm-apps/xenial | * |
Modsecurity-apache | Ubuntu | focal | * |
Modsecurity-apache | Ubuntu | jammy | * |
Modsecurity-apache | Ubuntu | kinetic | * |
Modsecurity-apache | Ubuntu | trusty | * |
Modsecurity-apache | Ubuntu | upstream | * |
Modsecurity-apache | Ubuntu | xenial | * |