OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OWASP Coraza WAF is a golang modsecurity compatible web application firewall library. Prior to 3.3.3, if a request is made on an URI starting with //, coraza will set a wrong value in REQUEST_FILENAME. For example, if the URI //bar/uploads/foo.php?a=b is passed to coraza: , REQUEST_FILENAME will be set to /uploads/foo.php. This can lead to a rules bypass. This vulnerability is fixed in 3.3.3. | |
Title | OWASP Coraza WAF has parser confusion which leads to wrong URI in `REQUEST_FILENAME` | |
Weaknesses | CWE-706 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-03-20T17:44:59.024Z
Updated: 2025-03-20T18:18:27.514Z
Reserved: 2025-03-12T13:42:22.135Z
Link: CVE-2025-29914

Updated: 2025-03-20T18:18:03.690Z

Status : Received
Published: 2025-03-20T18:15:18.907
Modified: 2025-03-20T18:15:18.907
Link: CVE-2025-29914

No data.