BIT-modsecurity-2024-46292

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/modsecurity/BIT-modsecurity-2024-46292.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-modsecurity-2024-46292
Aliases
Published
2025-06-18T14:49:01.714Z
Modified
2025-06-18T15:44:49.903646Z
Summary
[none]
Details

A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).

Database specific
{
    "cpes": [
        "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / modsecurity

Package

Name
modsecurity
Purl
pkg:bitnami/modsecurity

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
3.0.12
Fixed
3.0.13