WAF Bypass Vulnerability Affects ModSecurity v3
CVE-2024-1019

8.6HIGH

Key Information:

Vendor
CVE Published:
30 January 2024

What is CVE-2024-1019?

ModSecurity versions 3.0.0 through 3.0.11 are susceptible to a WAF bypass vulnerability, wherein attackers can craft request URLs that exploit the way ModSecurity handles percent-encoded characters. The improper decoding and separation of the URL path component from the query string can lead to discrepancies with RFC-compliant back-end applications. This flaw allows an attack payload to be concealed within the path component of the URL, potentially evading WAF inspection rules. Organizations utilizing ModSecurity are encouraged to upgrade to version 3.0.12 to mitigate this issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

ModSecurity 3.0.0 <= 3.0.11

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Andrea Menin @AndreaTheMiddle <https://github.com/theMiddleBlue>
Matteo Pace @M4tteoP <https://github.com/M4tteoP>
Max Leske <https://github.com/theseion>
Ervin HegedĂĽs @airween <https://github.com/airween>
.