Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39958— Response body bypass in OWASP ModSecurity Core Rule Set via repeated HTTP Range header submission with a small byte range

CVSS 7.5 · High EPSS 0.21% · P43
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-39958

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Response body bypass in OWASP ModSecurity Core Rule Set via repeated HTTP Range header submission with a small byte range
Source: NVD (National Vulnerability Database)
Vulnerability Description
The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, access to which would ordinarily be detected, may be exfiltrated from the backend, despite being protected by a web application firewall that uses CRS. Short subsections of a restricted resource may bypass pattern matching techniques and allow undetected access. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
OWASP ModSecurity Core Rule Set 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OWASP ModSecurity Core Rule Set(CRS)是一组用于ModSecurity或兼容的Web应用程序防火墙的通用攻击检测规则。 OWASP ModSecurity Core Rule Set (CRS)存在安全漏洞,该漏洞源于响应规则集绕过小范围标头。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
OWASPModSecurity Core Rule Set 3.0.x -

II. Public POCs for CVE-2022-39958

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-39958

登录查看更多情报信息。

Same Patch Batch · OWASP · 2022-09-20 · 4 CVEs total

CVE-2022-399557.3 HIGHPartial rule set bypass in OWASP ModSecurity Core Rule Set by submitting a specially craft
CVE-2022-399567.3 HIGHPartial rule set bypass in OWASP ModSecurity Core Rule Set for HTTP multipart requests us
CVE-2022-399577.3 HIGHResponse body bypass in OWASP ModSecurity Core Rule Set via a specialy crafted charset in

IV. Related Vulnerabilities

V. Comments for CVE-2022-39958

No comments yet


Leave a comment