Vulnerability from bitnami_vulndb
Published
2025-05-26 07:11
Modified
2025-05-26 07:44
Summary
ModSecurity Has Possible DoS Vulnerability
Details
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload's content type is application/json, and there is at least one rule which does a sanitiseMatchedBytes action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "modsecurity",
"purl": "pkg:bitnami/modsecurity"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.12"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-47947"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload\u0027s content type is `application/json`, and there is at least one rule which does a `sanitiseMatchedBytes` action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.",
"id": "BIT-modsecurity-2025-47947",
"modified": "2025-05-26T07:44:26.501Z",
"published": "2025-05-26T07:11:15.892Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/owasp-modsecurity/ModSecurity/pull/3389"
},
{
"type": "WEB",
"url": "https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47947"
}
],
"schema_version": "1.6.2",
"summary": "ModSecurity Has Possible DoS Vulnerability"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…