{"id":"CVE-2018-16384","details":"A SQL injection bypass (aka PL1 bypass) exists in OWASP ModSecurity Core Rule Set (owasp-modsecurity-crs) through v3.1.0-rc3 via {`a`b} where a is a special function name (such as \"if\") and b is the SQL statement to be executed.","modified":"2026-04-16T04:41:53.293387553Z","published":"2018-09-03T02:29:00.360Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00033.html"},{"type":"EVIDENCE","url":"https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1167"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/coreruleset/coreruleset","events":[{"introduced":"0"},{"last_affected":"e4e0497be4d598cce0e0a8fef20d1f1e5578c8d0"},{"introduced":"0"},{"last_affected":"36f1b87dda9b03b372902e316fec3a9e921a2dcc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.2"},{"introduced":"0"},{"last_affected":"3.1.0-rc1"}]}}],"versions":["v2.2.5","v2.2.6","v2.2.7","v3.0.0-rc1","v3.0.0-rc2","v3.0.0-rc3","v3.0.1","v3.0.2","v3.1.0-rc1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.1.0-rc3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16384.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}