Vulnerabilities
Vulnerable Software
Oisf:  >> Suricata  >> 4.1.10  Security Vulnerabilities
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
CVSS Score
9.8
EPSS Score
0.006
Published
2023-06-19
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
CVSS Score
7.5
EPSS Score
0.004
Published
2021-12-16
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
CVSS Score
9.8
EPSS Score
0.002
Published
2021-11-19
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
CVSS Score
7.5
EPSS Score
0.009
Published
2021-07-22


Contact Us

Shodan ® - All rights reserved