Trustwave

Modsecurity

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Veröffentlicht 21.05.2025 22:15:50
  • Zuletzt bearbeitet 20.06.2025 16:13:40

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload'...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 25.02.2025 20:15:37
  • Zuletzt bearbeitet 28.02.2025 13:35:22

Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 vers...

  • EPSS 0.14%
  • Veröffentlicht 09.10.2024 16:15:04
  • Zuletzt bearbeitet 17.06.2025 15:49:56

A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentati...

  • EPSS 0.09%
  • Veröffentlicht 20.01.2023 19:15:18
  • Zuletzt bearbeitet 02.04.2025 17:15:34

Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.

  • EPSS 0.51%
  • Veröffentlicht 20.01.2023 19:15:17
  • Zuletzt bearbeitet 03.07.2025 20:59:18

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C l...

Exploit
  • EPSS 2.22%
  • Veröffentlicht 07.12.2021 22:15:06
  • Zuletzt bearbeitet 03.07.2025 20:59:18

ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP ...

Exploit
  • EPSS 0.84%
  • Veröffentlicht 15.04.2014 10:55:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.

Exploit
  • EPSS 5.38%
  • Veröffentlicht 15.07.2013 15:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header...

  • EPSS 4.85%
  • Veröffentlicht 25.04.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference...

Exploit
  • EPSS 13.67%
  • Veröffentlicht 28.12.2012 11:48:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.