<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0023</id>
    <title>An update for mod_security_crs is now available for HCE 2.0</title>
    <severity>Critical</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-02 12:00:44"/>
    <updated date="2026-03-02 12:00:44"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2019-11389" id="CVE-2019-11389" title="CVE-2019-11389 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2026-21876" id="CVE-2026-21876" title="CVE-2026-21876 Base Score: 9.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) through 3.1.0. /rules/REQUEST-933-APPLICATION-ATTACK-PHP.conf allows remote attackers to cause a denial of service (ReDOS) by entering a specially crafted string with next# at the beginning and nested repetition operators. NOTE: the software maintainer disputes that this is a vulnerability because the issue cannot be exploited via ModSecurity (CVE-2019-11389)

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue. (CVE-2026-21876)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="mod_security_crs">
        <name>HCE 2.0</name>
        <package arch="noarch" name="mod_security_crs" version="3.2.2" release="1.r2.hce2">
          <filename>mod_security_crs-3.2.2-1.r2.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
