CVE-2019-20372

Name
CVE-2019-20372
Description
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/kubernetes/ingress-nginx/pull/4859
Exploit https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf
Release Notes https://duo.com/docs/dng-notes#version-1.5.4-january-2020
Mitigation http://nginx.org/en/CHANGES
Patch https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e
Third Party Advisory https://usn.ubuntu.com/4235-1/
UBUNTU https://usn.ubuntu.com/4235-2/
CONFIRM https://security.netapp.com/advisory/ntap-20200127-0003/
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html
CONFIRM https://support.apple.com/kb/HT212818
FULLDISC http://seclists.org/fulldisclosure/2021/Sep/36

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:* nginx >= None < 1.17.7

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
nginx 3.11-main 1.16.1-r8 Jakub Jirutka <jakub@jirutka.cz> fixed