Name | CVE-2023-24021 |
Description | Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer overflows on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
References | DLA-3283-1 |
Debian Bugs | 1029329 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
modsecurity-apache (PTS) | buster | 2.9.3-1+deb10u1 | vulnerable |
buster (security) | 2.9.3-1+deb10u2 | fixed | |
bullseye (security), bullseye | 2.9.3-3+deb11u1 | vulnerable | |
bookworm, sid | 2.9.7-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
modsecurity-apache | source | buster | 2.9.3-1+deb10u2 | DLA-3283-1 | ||
modsecurity-apache | source | (unstable) | 2.9.7-1 | 1029329 |
[bullseye] - modsecurity-apache <no-dsa> (Minor issue)
https://github.com/SpiderLabs/ModSecurity/pull/2857
https://github.com/SpiderLabs/ModSecurity/commit/4324f0ac59f8225aa44bc5034df60dbeccd1d334 (v2.9.7)