CVE-2019-20372
Published: 9 January 2020
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
nginx Launchpad, Ubuntu, Debian |
bionic |
Released
(1.14.0-0ubuntu1.7)
|
disco |
Released
(1.15.9-0ubuntu1.2)
|
|
eoan |
Released
(1.16.1-0ubuntu2.1)
|
|
precise |
Does not exist
|
|
trusty |
Released
(1.4.6-1ubuntu3.9+esm1)
|
|
upstream |
Released
(1.17.7)
|
|
xenial |
Released
(1.10.3-0ubuntu0.16.04.5)
|
|
Patches: upstream: https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372
- https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf
- http://nginx.org/en/CHANGES
- https://duo.com/docs/dng-notes#version-1.5.4-january-2020
- https://github.com/kubernetes/ingress-nginx/pull/4859
- https://ubuntu.com/security/notices/USN-4235-1
- https://ubuntu.com/security/notices/USN-4235-2
- NVD
- Launchpad
- Debian