{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"mod_security security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for mod_security is now available for openEuler-22.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"This software is also called Modsec,it is an open-source web application firewall. It is designed for Apache HTTP Server.ModSecurity is commonly deployed to provide protections against generic classed of vulnerabilities.The install of this package is easy and you can read the README.TXT for more information.\n\nSecurity Fix(es):\n\nIn ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.(CVE-2022-48279)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for mod_security is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"mod_security",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-1378",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1378"
			},
			{
				"summary":"CVE-2022-48279",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-48279&packageName=mod_security"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48279"
			},
			{
				"summary":"openEuler-SA-2024-1378 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-1378.json"
			}
		],
		"title":"An update for mod_security is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-04-12T09:14:33+08:00",
			"revision_history":[
				{
					"date":"2024-04-12T09:14:33+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:14:33+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:14:33+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:14:33+08:00",
			"id":"openEuler-SA-2024-1378",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64.rpm",
									"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64.rpm"
								},
								"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-2.9.5-9.oe2203sp1.aarch64.rpm",
									"name":"mod_security-2.9.5-9.oe2203sp1.aarch64.rpm"
								},
								"name":"mod_security-2.9.5-9.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64.rpm",
									"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64.rpm"
								},
								"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-2.9.5-9.oe2203sp1.src.rpm",
									"name":"mod_security-2.9.5-9.oe2203sp1.src.rpm"
								},
								"name":"mod_security-2.9.5-9.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64.rpm",
									"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64.rpm"
								},
								"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64.rpm",
									"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64.rpm"
								},
								"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"mod_security-2.9.5-9.oe2203sp1.x86_64.rpm",
									"name":"mod_security-2.9.5-9.oe2203sp1.x86_64.rpm"
								},
								"name":"mod_security-2.9.5-9.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64",
					"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-2.9.5-9.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.aarch64",
					"name":"mod_security-2.9.5-9.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64",
					"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-2.9.5-9.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.src",
					"name":"mod_security-2.9.5-9.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64",
					"name":"mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64",
					"name":"mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"mod_security-2.9.5-9.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.x86_64",
					"name":"mod_security-2.9.5-9.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-48279",
			"notes":[
				{
					"text":"In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.x86_64"
					],
					"details":"mod_security security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1378"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:mod_security-debuginfo-2.9.5-9.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mod_security-debugsource-2.9.5-9.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:mod_security-2.9.5-9.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-48279"
		}
	]
}