Debian Package Tracker
Register | Log in
Subscribe

modsecurity-crs

OWASP ModSecurity Core Rule Set

Choose email to subscribe with

general
  • source: modsecurity-crs (main)
  • version: 3.3.4-1
  • maintainer: Alberto Gonzalez Iniesta (DMD)
  • uploaders: Ervin Hegedus [DMD]
  • arch: all
  • std-ver: 4.4.1.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.0.0-3
  • o-o-bpo: 3.0.2-1~bpo9+1
  • oldstable: 3.1.0-1+deb10u2
  • old-sec: 3.2.3-0+deb10u3
  • old-bpo: 3.3.0-1~bpo10+1
  • stable: 3.3.0-1+deb11u1
  • testing: 3.3.4-1
  • unstable: 3.3.4-1
versioned links
  • 3.0.0-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.0.2-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.0-1+deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.2.3-0+deb10u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.0-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.0-1+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • modsecurity-crs
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
In debian/watch no matching files for watch line
  https://github.com/coreruleset/coreruleset/releases .*/v?(\d[\d\.]+)\.tar\.gz
Created: 2022-09-21 Last update: 2023-03-24 10:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2022-07-27 Last update: 2023-03-24 10:32
lintian reports 6 warnings normal
Lintian reports 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-10-03 Last update: 2023-02-17 00:38
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • modsecurity-crs could be marked Multi-Arch: foreign
Created: 2016-12-22 Last update: 2023-03-24 05:36
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 3.3.4-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-26 15:54
5 low-priority security issues in bullseye low

There are 5 open security issues in bullseye.

5 issues left for the package maintainer to handle:
  • CVE-2020-22669: (needs triaging) Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a SQL injection bypass vulnerability. Attackers can use the comment characters and variable assignments in the SQL syntax to bypass Modsecurity WAF protection and implement SQL injection attacks on Web applications.
  • CVE-2022-39955: (needs triaging) The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
  • CVE-2022-39956: (needs triaging) The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass for HTTP multipart requests by submitting a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MIME header fields that will not be decoded and inspected by the web application firewall engine and the rule set. The multipart payload will therefore bypass detection. A vulnerable backend that supports these encoding schemes can potentially be exploited. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised upgrade to 3.2.2 and 3.3.3 respectively. The mitigation against these vulnerabilities depends on the installation of the latest ModSecurity version (v2.9.6 / v3.0.8).
  • CVE-2022-39957: (needs triaging) The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset", this response can not be decoded by the web application firewall. A restricted resource, access to which would ordinarily be detected, may therefore bypass detection. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
  • CVE-2022-39958: (needs triaging) The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, access to which would ordinarily be detected, may be exfiltrated from the backend, despite being protected by a web application firewall that uses CRS. Short subsections of a restricted resource may bypass pattern matching techniques and allow undetected access. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-09-03 Last update: 2023-01-30 23:07
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.4.1.1).
Created: 2020-01-21 Last update: 2022-12-17 19:18
news
[rss feed]
  • [2023-01-30] Accepted modsecurity-crs 3.2.3-0+deb10u3 (source) into oldstable (Tobias Frost)
  • [2022-10-08] modsecurity-crs 3.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-03] Accepted modsecurity-crs 3.3.4-1 (source) into unstable (Ervin Hegedüs) (signed by: Alberto Gonzalez Iniesta)
  • [2021-09-25] Accepted modsecurity-crs 3.1.0-1+deb10u2 (source all) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2021-09-09] Accepted modsecurity-crs 3.3.0-1+deb11u1 (source all) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2021-08-29] modsecurity-crs 3.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-24] Accepted modsecurity-crs 3.3.2-1 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2020-09-22] Accepted modsecurity-crs 3.3.0-1~bpo10+1 (source all) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Alberto Gonzalez Iniesta)
  • [2020-08-22] modsecurity-crs 3.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-16] Accepted modsecurity-crs 3.3.0-1 (source) into unstable (Alberto Gonzalez Iniesta)
  • [2019-11-09] Accepted modsecurity-crs 3.1.0-1+deb10u1 (source all) into proposed-updates->stable-new, proposed-updates (Alberto Gonzalez Iniesta)
  • [2019-11-08] modsecurity-crs 3.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2019-11-03] Accepted modsecurity-crs 3.2.0-1 (source) into unstable (Ervin Hegedus) (signed by: Alberto Gonzalez Iniesta)
  • [2019-06-26] Accepted modsecurity-crs 3.1.1-1 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2018-12-02] modsecurity-crs 3.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2018-11-27] Accepted modsecurity-crs 3.1.0-1 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2017-11-11] Accepted modsecurity-crs 3.0.2-1~bpo8+1 (source all) into jessie-backports-sloppy, jessie-backports-sloppy (Alberto Gonzalez Iniesta)
  • [2017-10-25] Accepted modsecurity-crs 3.0.2-1~bpo9+1 (source all) into stretch-backports, stretch-backports (Alberto Gonzalez Iniesta)
  • [2017-10-15] modsecurity-crs 3.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2017-10-10] Accepted modsecurity-crs 3.0.2-1 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2017-01-28] Accepted modsecurity-crs 2.2.9-1+deb8u1 (source all) into proposed-updates->stable-new, proposed-updates (Alberto Gonzalez Iniesta)
  • [2017-01-12] Accepted modsecurity-crs 3.0.0-3~bpo8+1 (source all) into jessie-backports (Alberto Gonzalez Iniesta)
  • [2017-01-02] modsecurity-crs 3.0.0-3 MIGRATED to testing (Debian testing watch)
  • [2016-12-22] Accepted modsecurity-crs 3.0.0-3 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2016-11-29] Accepted modsecurity-crs 3.0.0-2~bpo8+1 (source all) into jessie-backports, jessie-backports (Alberto Gonzalez Iniesta)
  • [2016-11-23] modsecurity-crs 3.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2016-11-17] Accepted modsecurity-crs 3.0.0-2 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2016-11-17] Accepted modsecurity-crs 3.0.0-1 (source all) into unstable (Alberto Gonzalez Iniesta)
  • [2016-09-25] modsecurity-crs 2.2.9-2 MIGRATED to testing (Debian testing watch)
  • [2016-09-19] Accepted modsecurity-crs 2.2.9-2 (source all) into unstable (Alberto Gonzalez Iniesta)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 6)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.3.4-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing