|
|
Message-ID: <20260418173640.GA24846@openwall.com> Date: Sat, 18 Apr 2026 19:36:40 +0200 From: Solar Designer <solar@...nwall.com> To: cyber security <cs7778503@...il.com> Cc: oss-security@...ts.openwall.com Subject: Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability Hi, On Sat, Apr 18, 2026 at 08:14:12AM -0400, cyber security wrote: > Also you can use CVE-2026-33691, to disable security headers while bypassing CRS > > More info at https://unlockoldupload.hashnode.dev/turn-off-security-headers-using-cve-2026-33691 This gives a 404 Page Not Found, but more importantly actual content should have been directly included in your posting, not only referenced via a link (although providing a link as well would then be OK). > On Sat, Apr 18, 2026 at 3:00 AM cyber security <cs7778503@...il.com> wrote: > > After deep analysis we confirm, that CVE-2026-33691 aka it alias > > UnlockOldUpload, can even disable ModSecurity WAF > > > > More info at https://unlockoldupload.hashnode.dev/disable-modsecurity-waf-using-cve-2026-33691. This one exists. The gist of it is: "upload a file called .htaccess with the content SecRuleEngine Off" which should have been directly in your message. With this, I think you've said enough about this CVE already, and should stop here - no further examples are needed. Thanks, Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.