{"id":"BIT-modsecurity-2022-48279","details":"In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.","aliases":["BIT-modsecurity2-2022-48279","CVE-2022-48279"],"modified":"2025-07-04T08:10:20.098Z","published":"2024-03-06T10:56:55.390Z","database_specific":{"cpes":["cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"],"severity":"High"},"references":[{"type":"WEB","url":"https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/"},{"type":"WEB","url":"https://github.com/SpiderLabs/ModSecurity/pull/2795"},{"type":"WEB","url":"https://github.com/SpiderLabs/ModSecurity/pull/2797"},{"type":"WEB","url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6"},{"type":"WEB","url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48279"}],"affected":[{"package":{"name":"modsecurity","ecosystem":"Bitnami","purl":"pkg:bitnami/modsecurity"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.9.6"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/modsecurity/BIT-modsecurity-2022-48279.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}],"schema_version":"1.7.3"}