An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386 | third party advisory exploit |
https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1391 | third party advisory |