CVE-2019-11390

NameCVE-2019-11390
DescriptionAn issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with set_error_handler# at the beginning and nested repetition operators. NOTE: the software maintainer disputes that this is a vulnerability because the issue cannot be exploited via ModSecurity
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs928053

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
modsecurity-crs (PTS)buster3.1.0-1+deb10u2vulnerable (unimportant)
buster (security)3.2.3-0+deb10u3vulnerable (unimportant)
bullseye3.3.0-1+deb11u1vulnerable (unimportant)
bookworm3.3.4-1vulnerable (unimportant)
sid, trixie3.3.5-2vulnerable (unimportant)

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
modsecurity-crssource(unstable)(unfixed)unimportant928053

Notes

https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358
Negligible security impact, doesn't affect the CRS rule set as used
by libapache2-mod-security2, only affects libmodsecurity3 in non-standard settings

Search for package or bug name: Reporting problems