OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3. | |
| Title | OWASP Coraza WAF has parser confusion which leads to wrong URI in `REQUEST_FILENAME` | |
| Weaknesses | CWE-706 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-20T17:44:59.024Z
Updated: 2025-03-20T18:18:27.514Z
Reserved: 2025-03-12T13:42:22.135Z
Link: CVE-2025-29914
Updated: 2025-03-20T18:18:03.690Z
Status : Received
Published: 2025-03-20T18:15:18.907
Modified: 2025-03-20T18:15:18.907
Link: CVE-2025-29914
No data.