Access of Resource Using Incompatible Type ('Type Confusion') Affecting modsecurity-crs package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.17% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-MODSECURITYCRS-5776685
  • published15 Jul 2023
  • disclosed13 Jul 2023

Introduced: 13 Jul 2023

CVE-2023-38199  (opens in a new tab)
CWE-843  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 modsecurity-crs.

NVD Description

Note: Versions mentioned in the description apply only to the upstream modsecurity-crs package and not the modsecurity-crs package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

CVSS Scores

version 3.1