CVE Vulnerabilities

CVE-2025-47947

Excessive Platform Resource Consumption within a Loop

Published: May 21, 2025 | Modified: May 23, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payloads content type is application/json, and there is at least one rule which does a sanitiseMatchedBytes action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.

Weakness

The product has a loop body or loop condition that contains a control element that directly or indirectly consumes platform resources, e.g. messaging, sessions, locks, or file descriptors.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat mod_security-0:2.9.6-2.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat mod_security-0:2.9.2-8.el8_2.1 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat mod_security-0:2.9.2-9.el8_4.1 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat mod_security-0:2.9.2-9.el8_6.1 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat mod_security-0:2.9.2-9.el8_6.1 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat mod_security-0:2.9.2-9.el8_6.1 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat mod_security-0:2.9.6-1.el8_8.1 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat mod_security-0:2.9.6-1.el8_8.1 *
Red Hat Enterprise Linux 9 RedHat mod_security-0:2.9.6-2.el9_6 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat mod_security-0:2.9.3-12.el9_0.1 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat mod_security-0:2.9.6-1.el9_2.1 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat mod_security-0:2.9.6-1.el9_4.1 *
Modsecurity-apache Ubuntu bionic *
Modsecurity-apache Ubuntu esm-apps/bionic *
Modsecurity-apache Ubuntu esm-apps/focal *
Modsecurity-apache Ubuntu esm-apps/jammy *
Modsecurity-apache Ubuntu esm-apps/noble *
Modsecurity-apache Ubuntu esm-apps/xenial *
Modsecurity-apache Ubuntu esm-infra-legacy/trusty *
Modsecurity-apache Ubuntu focal *
Modsecurity-apache Ubuntu jammy *
Modsecurity-apache Ubuntu noble *
Modsecurity-apache Ubuntu oracular *
Modsecurity-apache Ubuntu plucky *
Modsecurity-apache Ubuntu trusty *
Modsecurity-apache Ubuntu trusty/esm *
Modsecurity-apache Ubuntu upstream *
Modsecurity-apache Ubuntu xenial *

Extended Description

This issue can make the product perform more slowly. If an attacker can influence the number of iterations in the loop, then this performance problem might allow a denial of service by consuming more platform resources than intended.

References