{"id":"CVE-2022-48279","details":"In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.","aliases":["BIT-modsecurity-2022-48279","BIT-modsecurity2-2022-48279"],"modified":"2026-04-16T00:08:32.835693178Z","published":"2023-01-20T19:15:17.783Z","related":["SUSE-SU-2023:0314-1","SUSE-SU-2023:0317-1","SUSE-SU-2023:0318-1","openSUSE-SU-2025:14703-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"10.0"}]}]},"references":[{"type":"WEB","url":"https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52TGCZCOHYBDCVWJYNN2PS4QLOHCXWTQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYRTXTOQQI6SB2TLI5QXU76DURSLS4XI/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WCH6JM4I4MD4YABYFHSBDDOUFDGIFJKL/"},{"type":"ADVISORY","url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6"},{"type":"ADVISORY","url":"https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00023.html"},{"type":"FIX","url":"https://github.com/SpiderLabs/ModSecurity/pull/2795"},{"type":"FIX","url":"https://github.com/SpiderLabs/ModSecurity/pull/2797"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/owasp-modsecurity/modsecurity","events":[{"introduced":"c1cd668acb820824e791ba802396c60900eae9c1"},{"fixed":"996c7e1e1f782111331e0ff37cbaf6c6a29c3530"},{"introduced":"0"},{"fixed":"dfba4fd24a4e790bb4156e9347d5ec947101080d"}],"database_specific":{"source":["CPE_FIELD","REFERENCES"],"cpe":["cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:*","cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"3.0.0"},{"fixed":"3.0.8"},{"introduced":"0"},{"fixed":"2.9.6"}]}}],"versions":["v2.7.4","v2.9.0","v2.9.0-rc1","v2.9.0-rc2","v2.9.1","v2.9.1-rc1","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.0.7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48279.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}