[CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability
嗯,用户发来了一段邮件内容,看起来是关于OWASP CRS的一个漏洞。他让我用中文总结一下,控制在100字以内,而且不需要特定的开头。首先,我需要理解邮件的主要内容。 邮件提到OWASP CRS中发现了一个漏洞,具体是文件名中的空白字符填充可以绕过上传扩展名检查。攻击者可以上传危险文件,比如.php、.jsp等。影响方面,在Windows后端更容易被利用,因为它们会规范化文件名中的空白字符。Linux则需要后端使用类似.strip()的方法才会受影响。修复方面已经发布了补丁版本。 接下来,我需要将这些信息浓缩到100字以内。重点包括漏洞类型、影响范围、受影响的系统以及修复情况。同时要避免使用“文章内容总结”这样的开头。 可能的结构是:首先说明漏洞是什么,然后描述影响,最后提到修复措施。这样既简洁又全面。 最后检查一下字数是否符合要求,并确保语言流畅自然。 </think> OWASP CRS存在一个文件上传漏洞(CVE-2026-33691),允许通过空白字符填充文件名绕过扩展名检查,上传危险文件如.php、.jsp等。Windows后端更易受攻击,Linux需特定处理才受影响。已修复于v3.3.9、v4.25.x LTS和v4.8.x版本。 2026-4-3 03:52:42 Author: seclists.org(查看原文) 阅读量:4 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: cyber security <cs7778503 () gmail com>
Date: Mon, 30 Mar 2026 04:54:16 -0400

A vulnerability was identified in OWASP CRS where whitespace padding
in filenames can bypass file upload extension checks, allowing uploads
of dangerous files such as .php, .phar, .jsp, and .jspx. This issue
has been assigned CVE‑2026‑33691.

Impact: Attackers may evade CRS protections and upload web shells
disguised with whitespace‑padded extensions. Exploitation is most
practical on Windows backends that normalize whitespace in filenames
before execution, In linux harder because it require a backend that
use like `.strip()` and `.trim()` and other whitespace trimming
methods depending on the language here vulnerable to that or the
webserver strip whitespaces or the backend on general, If not they not
vulnerable to that.

Fix: Patched in CRS v3.3.9, v4.25.x LTS, and v4.8.x. Security fixes
are always backported to supported branches.

References:

Full advisory: https://github.com/coreruleset/coreruleset/security/advisories/GHSA-rw5f-9w43-gv2w

Credits: Reported by RelunSec (aka @HackingRepo on Github).
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability cyber security (Apr 02)

文章来源: https://seclists.org/fulldisclosure/2026/Apr/0
如有侵权请联系:admin#unsafe.sh