{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"CRITICAL"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type  charset  names and therefore bypassing the configurable CRS Content-Type header  charset  allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39955"
			},
			{
				"summary":"CVE-2022-39955 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2022/csaf-openeuler-cve-2022-39955.json"
			},
			{
				"summary":"openEuler-SA-2022-1964",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1964"
			},
			{
				"summary":"CVE-2022-39955",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-39955&packageName=mod_security_crs"
			}
		],
		"title":"openEuler cve CVE-2022-39955",
		"tracking":{
			"initial_release_date":"2022-09-27T09:46:42+08:00",
			"revision_history":[
				{
					"date":"2022-09-27T09:46:42+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:46:42+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:46:42+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:46:42+08:00",
			"id":"CVE-2022-39955",
			"version":"2.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP3"
									},
									"product_id":"openEuler-20.03-LTS-SP3",
									"name":"openEuler-20.03-LTS-SP3"
								},
								"name":"openEuler-20.03-LTS-SP3",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"openEuler-22.03-LTS",
									"name":"openEuler-22.03-LTS"
								},
								"name":"openEuler-22.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"mod_security_crs-3.2.2-1.oe1.noarch.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP3"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe1.noarch.rpm(20.03-LTS-SP3)",
									"name":"mod_security_crs-3.2.2-1.oe1.noarch.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe2203.noarch.rpm",
									"name":"mod_security_crs-3.2.2-1.oe2203.noarch.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe2203.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"mod_security_crs-3.2.2-1.oe1.src.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe1.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP3"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe1.src.rpm(20.03-LTS-SP3)",
									"name":"mod_security_crs-3.2.2-1.oe1.src.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe1.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"mod_security_crs-3.2.2-1.oe2203.src.rpm",
									"name":"mod_security_crs-3.2.2-1.oe2203.src.rpm"
								},
								"name":"mod_security_crs-3.2.2-1.oe2203.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"mod_security_crs-3.2.2-1.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.noarch",
					"name":"mod_security_crs-3.2.2-1.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP3",
				"product_reference":"mod_security_crs-3.2.2-1.oe1.noarch.rpm(20.03-LTS-SP3)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.noarch",
					"name":"mod_security_crs-3.2.2-1.oe1.noarch as a component of openEuler-20.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"mod_security_crs-3.2.2-1.oe2203.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.noarch",
					"name":"mod_security_crs-3.2.2-1.oe2203.noarch as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"mod_security_crs-3.2.2-1.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.src",
					"name":"mod_security_crs-3.2.2-1.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP3",
				"product_reference":"mod_security_crs-3.2.2-1.oe1.src.rpm(20.03-LTS-SP3)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.src",
					"name":"mod_security_crs-3.2.2-1.oe1.src as a component of openEuler-20.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"mod_security_crs-3.2.2-1.oe2203.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.src",
					"name":"mod_security_crs-3.2.2-1.oe2203.src as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-39955",
			"notes":[
				{
					"text":"The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type  charset  names and therefore bypassing the configurable CRS Content-Type header  charset  allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.noarch",
					"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.noarch",
					"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.noarch",
					"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.src",
					"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.src",
					"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.noarch",
						"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.noarch",
						"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.noarch",
						"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.src",
						"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.src",
						"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.src"
					],
					"details":"mod_security_crs security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1964"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.noarch",
						"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.noarch",
						"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.noarch",
						"openEuler-20.03-LTS-SP1:mod_security_crs-3.2.2-1.oe1.src",
						"openEuler-20.03-LTS-SP3:mod_security_crs-3.2.2-1.oe1.src",
						"openEuler-22.03-LTS:mod_security_crs-3.2.2-1.oe2203.src"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2022-39955"
		}
	]
}