HTTP Request Smuggling Affecting nginx package, versions <1.14.2-2+deb10u3
Snyk CVSS
Attack Complexity
Low
Integrity
High
Threat Intelligence
EPSS
0.58% (78th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-NGINX-565250
- published 13 Apr 2020
- disclosed 12 Apr 2020
Introduced: 12 Apr 2020
CVE-2020-11724 Open this link in a new tabHow to fix?
Upgrade Debian:10
nginx
to version 1.14.2-2+deb10u3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nginx
package and not the nginx
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
An issue was discovered in OpenResty before 1.15.8.4. ngx_http_lua_subrequest.c allows HTTP request smuggling, as demonstrated by the ngx.location.capture API.
References
- https://security-tracker.debian.org/tracker/CVE-2020-11724
- https://security.netapp.com/advisory/ntap-20210129-0002/
- https://www.debian.org/security/2020/dsa-4750
- https://github.com/openresty/lua-nginx-module/commit/9ab38e8ee35fc08a57636b1b6190dca70b0076fa
- https://github.com/openresty/openresty/blob/4e8b4c395f842a078e429c80dd063b2323999957/patches/ngx_http_lua-0.10.15-fix_location_capture_content_length_chunked.patch
- https://lists.debian.org/debian-lts-announce/2020/07/msg00014.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2020-11724