Unrestricted Upload of File with Dangerous Type Affecting modsecurity-crs package, versions <3.2.3-0+deb10u3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Unrestricted Upload of File with Dangerous Type vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-MODSECURITYCRS-474584
  • published28 Oct 2019
  • disclosed9 Jul 2019

Introduced: 9 Jul 2019

CVE-2019-13464  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

Upgrade Debian:10 modsecurity-crs to version 3.2.3-0+deb10u3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream modsecurity-crs package and not the modsecurity-crs package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.