CVE-2020-22669

Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
References
Link Resource
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1727 Exploit Issue Tracking Third Party Advisory
https://github.com/coreruleset/coreruleset/pull/1793 Exploit Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:3.2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-09-02 18:15

Updated : 2024-02-28 19:29


NVD link : CVE-2020-22669

Mitre link : CVE-2020-22669

CVE.ORG link : CVE-2020-22669


JSON object : View

Products Affected

debian

  • debian_linux

owasp

  • owasp_modsecurity_core_rule_set
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')