Name | CVE-2019-11390 |
Description | An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with set_error_handler# at the beginning and nested repetition operators. NOTE: the software maintainer disputes that this is a vulnerability because the issue cannot be exploited via ModSecurity |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 928053 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
modsecurity-crs (PTS) | jessie | 2.2.9-1+deb8u1 | vulnerable |
| stretch (lts), stretch | 3.2.3-0+deb9u1 | vulnerable |
| buster (security), buster, buster (lts) | 3.2.3-0+deb10u3 | vulnerable |
| bullseye | 3.3.0-1+deb11u1 | vulnerable |
| bookworm | 3.3.4-1 | vulnerable |
| sid, trixie | 3.3.7-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
modsecurity-crs | source | (unstable) | (unfixed) | unimportant | | 928053 |
Notes
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1358
Negligible security impact, doesn't affect the CRS rule set as used
by libapache2-mod-security2, only affects libmodsecurity3 in non-standard settings