Description
A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
INFO
Published Date :
2024-10-09T00:00:00.000Z
Last Modified :
2024-10-20T23:47:38.210Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2024-46292 vulnerability.
| Vendors | Products |
|---|---|
| Modsecurity |
|
| Trustwave |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-46292.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact