We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-38199



Description

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

Reserved 2023-07-13 | Published 2023-07-13 | Updated 2024-10-30 | Assigner mitre

References

github.com/coreruleset/coreruleset/issues/3191

github.com/coreruleset/coreruleset/pull/3237

cve.org (CVE-2023-38199)

nvd.nist.gov (CVE-2023-38199)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-38199

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.