Unrated severityNVD Advisory· Published Jan 20, 2023· Updated Apr 3, 2025
CVE-2022-48279
CVE-2022-48279
Description
In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
Affected products
29- ModSecurity/ModSecuritydescription
- osv-coords28 versionspkg:bitnami/modsecuritypkg:bitnami/modsecurity2pkg:rpm/opensuse/apache2-mod_security2&distro=openSUSE%20Leap%2015.4pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP4pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2015%20SP3pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.2pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/apache2-mod_security2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 2.9.6+ 27 more
- (no CPE)range: < 2.9.6
- (no CPE)range: < 2.9.6
- (no CPE)range: < 2.9.4-150400.3.3.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.4-150400.3.3.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.9.2-150000.3.6.1
- (no CPE)range: < 2.8.0-7.6.1
- (no CPE)range: < 2.8.0-7.6.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2023/01/msg00023.htmlmitremailing-list
- coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/mitre
- github.com/SpiderLabs/ModSecurity/pull/2795mitre
- github.com/SpiderLabs/ModSecurity/pull/2797mitre
- github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6mitre
- github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8mitre
News mentions
0No linked articles in our index yet.