Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20372

Опубликовано: 09 янв. 2020
Источник: redhat
CVSS3: 5.3
EPSS Средний

Описание

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

Отчет

Ansible Tower 3.5 and 3.6 are not vulnerable by default as are not using error_page variable in the nginx configuration. However, Ansible Tower 3.5 and 3.6 are distributing nginx 1.14 and 1.16 vulnerable versions as a dependency and configuration could be modified making it vulnerable. Red Hat CloudForms Management Engine 5.9 and 5.10 are not vulnerable by default as are not using error_page variable in the nginx configuration. However, both mentioned builds ships vulnerable nginx versions 1.10 and 1.14 respectively. CloudForms 5.11 does not use nginx directly hence it is not vulnerable. Red Hat Quay's configuration of nginx means it's not affected by this issue. It doesn't use error_page to do a 302 redirect. It's only use of error_page uses a named location ie: error_page 404 /404.html; location = /40x.html { } error_page 500 502 503 504 /50x.html; location = /50x.html { }

Меры по смягчению последствий

To mitigate this issue, use a named location instead of having the error_page handler do the redirect, this configuration is not vulnerable to request smuggling on all versions of NGINX we tested. server { listen 80; server_name localhost; error_page 401 @401; location / { return 401; } location @401 { return 302 http://example.org; } }

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5nginxWill not fix
Red Hat Enterprise Linux 8nginx:1.14/nginxWill not fix
Red Hat Software Collectionsrh-nginx110-nginxWill not fix
Red Hat Software Collectionsrh-nginx114-nginxWill not fix
Red Hat Ansible Tower 3.6 for RHEL 7ansible-tower-36/ansible-towerFixedRHSA-2021:077809.03.2021
Red Hat Ansible Tower 3.7 for RHEL 7ansible-tower-37/ansible-tower-rhel7FixedRHSA-2021:077909.03.2021
Red Hat Enterprise Linux 8nginxFixedRHSA-2020:549515.12.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-nginx116-nginxFixedRHSA-2020:281702.07.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-nginx116-nginxFixedRHSA-2020:281702.07.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-nginx116-nginxFixedRHSA-2020:281702.07.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1790277nginx: HTTP request smuggling in configurations with URL redirect used as error_page

EPSS

Процентиль: 99%
0.68429
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 6 лет назад

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

CVSS3: 5.3
nvd
около 6 лет назад

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

CVSS3: 5.3
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 5.3
debian
около 6 лет назад

NGINX before 1.17.7, with certain error_page configurations, allows HT ...

suse-cvrf
почти 6 лет назад

Security update for nginx

EPSS

Процентиль: 99%
0.68429
Средний

5.3 Medium

CVSS3