{"id":"CVE-2019-13464","details":"An issue was discovered in OWASP ModSecurity Core Rule Set (CRS) 3.0.2. Use of X.Filename instead of X_Filename can bypass some PHP Script Uploads rules, because PHP automatically transforms dots into underscores in certain contexts where dots are invalid.","modified":"2026-04-10T04:12:13.015563Z","published":"2019-07-09T19:15:12.560Z","references":[{"type":"ADVISORY","url":"https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1391"},{"type":"EVIDENCE","url":"https://github.com/SpiderLabs/owasp-modsecurity-crs/issues/1386"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spiderlabs/owasp-modsecurity-crs","events":[{"introduced":"0"},{"last_affected":"e4e0497be4d598cce0e0a8fef20d1f1e5578c8d0"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.2"}]}}],"versions":["2.2.7","v2.2.5","v2.2.6","v3.0.0-rc1","v3.0.0-rc2","v3.0.0-rc3","v3.0.1","v3.0.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-13464.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}