ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4.
2021-12-07T22:15:06.950
2025-07-03T20:59:18.650
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | owasp | modsecurity | < 3.0.6 | Yes |
Application | trustwave | modsecurity | < 2.9.5 | Yes |
Application | f5 | nginx_modsecurity_waf | r24 | Yes |
Application | f5 | nginx_modsecurity_waf | r25 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |
Application | oracle | http_server | 12.2.1.3.0 | Yes |
Application | oracle | http_server | 12.2.1.4.0 | Yes |
Application | oracle | zfs_storage_appliance_kit | 8.8 | Yes |