Fedora EPEL 7 update for libmodsecurity



Published: 2023-08-21
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2019-25043
CVE-2020-15598
CVE-2021-35368
CVE-2021-42717
CWE-ID CWE-755
CWE-400
CWE-693
CWE-674
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Fedora
Operating systems & Components / Operating system

libmodsecurity
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper handling of exceptional conditions

EUVDB-ID: #VU79793

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-25043

CWE-ID: CWE-755 - Improper Handling of Exceptional Conditions

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of errors while parsing key-value pair. A remote attacker can send a specially crafted header to the server and perform a denial of service (DoS) attack, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 7

libmodsecurity: before 3.0.9-2.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c5ad3565aa


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource exhaustion

EUVDB-ID: #VU46766

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-15598

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources while performing global matching of regular expressions in a combination of the ModSecurity “capture” action. A remote attacker can send a specially crafted HTTP request to the server and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 7

libmodsecurity: before 3.0.9-2.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c5ad3565aa


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Protection mechanism failure

EUVDB-ID: #VU54495

Risk: Medium

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35368

CWE-ID: CWE-693 - Protection Mechanism Failure

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures within the default CRS ruleset. An attacker can bypass implemented security restrictions and exploit vulnerabilities in the CMS that is protected with ModSecurity with the OWASP ModSecurity Core Rule Set (CRS).

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 7

libmodsecurity: before 3.0.9-2.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c5ad3565aa


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Uncontrolled Recursion

EUVDB-ID: #VU59052

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-42717

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion when processing excessively nested JSON objects. A remote attacker can send a specially crafted HTTP request and consume all available worker processes and CPU resources.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 7

libmodsecurity: before 3.0.9-2.el7

External links

http://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c5ad3565aa


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###