
Cloud Vulnerability DB
A community-led vulnerabilities database
Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) contains a SQL injection bypass vulnerability identified as CVE-2020-22669. The vulnerability was discovered in March 2020 and publicly disclosed on September 2, 2022. The affected software is the OWASP ModSecurity Core Rule Set (CRS), specifically version 3.2.0, which is used with ModSecurity or compatible web application firewalls (NVD, Debian Security).
The vulnerability allows attackers to bypass ModSecurity WAF protection by utilizing comment characters and variable assignments in SQL syntax. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue specifically relates to the way ModSecurity handles SQL syntax parsing at Paranoia Level 1 (PL1), allowing attackers to use special SQL constructs to evade detection (NVD, GitHub Issue).
When successfully exploited, this vulnerability enables attackers to bypass the Web Application Firewall protection and execute SQL injection attacks on web applications. This could potentially lead to unauthorized access to database contents, including sensitive information such as user credentials and other confidential data (GitHub Issue).
The vulnerability has been addressed in subsequent releases. Users are advised to upgrade to version 3.2.3 or later. For Debian 10 (buster) users, the fix is available in version 3.2.3-0+deb10u3. Organizations using ModSecurity should review and update their configurations, particularly the modsecurity.conf file, against the updated recommended configuration (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."