发布时间: 2022年10月24日
修改时间: 2022年10月24日
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
NVD | openEuler | |
---|---|---|
CVSS评分 | 9.8 | 9.8 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-2521 | Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications. | 2022年10月24日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | mod_security_crs | Unaffected |
KY3.4-5A | mod_security_crs | Unaffected |
KY3.5.1 | mod_security_crs | Unaffected |