OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.
History

Thu, 20 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 18:00:00 +0000

Type Values Removed Values Added
Description OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.
Title OWASP Coraza WAF has parser confusion which leads to wrong URI in `REQUEST_FILENAME`
Weaknesses CWE-706
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-03-20T17:44:59.024Z

Updated: 2025-03-20T18:18:27.514Z

Reserved: 2025-03-12T13:42:22.135Z

Link: CVE-2025-29914

cve-icon Vulnrichment

Updated: 2025-03-20T18:18:03.690Z

cve-icon NVD

Status : Received

Published: 2025-03-20T18:15:18.907

Modified: 2025-03-20T18:15:18.907

Link: CVE-2025-29914

cve-icon Redhat

No data.