{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-39958","title":"Title"},{"category":"description","text":"The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, access to which would ordinarily be detected, may be exfiltrated from the backend, despite being protected by a web application firewall that uses CRS. Short subsections of a restricted resource may bypass pattern matching techniques and allow undetected access. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively and to configure a CRS paranoia level of 3 or higher.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-39958","url":"https://www.suse.com/security/cve/CVE-2022-39958"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1207442 for CVE-2022-39958","url":"https://bugzilla.suse.com/1207442"}],"title":"SUSE CVE CVE-2022-39958","tracking":{"current_release_date":"2025-02-16T07:16:22Z","generator":{"date":"2023-02-15T03:23:42Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-39958","initial_release_date":"2023-02-15T03:23:42Z","revision_history":[{"date":"2023-02-15T03:23:42Z","number":"2","summary":"Current version"},{"date":"2025-01-01T02:54:45Z","number":"3","summary":"Current version"},{"date":"2025-02-08T04:43:54Z","number":"4","summary":"Current version"},{"date":"2025-02-14T07:30:30Z","number":"5","summary":"Current version"},{"date":"2025-02-16T07:16:22Z","number":"6","summary":"Current version"}],"status":"interim","version":"6"}}}