SB2023052103 - Gentoo update for OWASP ModSecurity Core Rule Set
Published: May 21, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Protection mechanism failure (CVE-ID: CVE-2021-35368)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures within the default CRS ruleset. An attacker can bypass implemented security restrictions and exploit vulnerabilities in the CMS that is protected with ModSecurity with the OWASP ModSecurity Core Rule Set (CRS).
2) Input validation error (CVE-ID: CVE-2022-39955)
The vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of user-supplied input when parsing HTTP Content-Type header field that indicates multiple character encoding schemes. A remote attacker send a specially crafted HTTP request and bypass the configurable CRS Content-Type header "charset" allow list.
3) Input validation error (CVE-ID: CVE-2022-39956)
The vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MIME header fields that will not be decoded and inspected by the web application firewall engine and the rule set.
4) Input validation error (CVE-ID: CVE-2022-39957)
The vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of HTTP Accept header field containing an optional "charset" parameter. A remote attacker can send a specially crafted HTTP request and bypass WAF detection.
5) Input validation error (CVE-ID: CVE-2022-39958)
The vulnerability allows a remote attacker to bypass filtration rules.
The vulnerability exists due to insufficient validation of the HTTP Range header field with a small byte range. A remote attacker can exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range.
Remediation
Install update from vendor's website.