CVE-2022-39957

Source
https://cve.org/CVERecord?id=CVE-2022-39957
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39957.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-39957
Downstream
Related
Published
2022-09-20T07:15:12.353Z
Modified
2026-02-17T00:29:29.474531Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.

References

Affected packages

Git / gitlab.com/wireshark/wireshark

Affected ranges

Type
GIT
Repo
https://gitlab.com/wireshark/wireshark
Events

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-39957.json"