Описание
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
Отчет
Ansible Tower 3.5 and 3.6 are not vulnerable by default as are not using error_page variable in the nginx configuration. However, Ansible Tower 3.5 and 3.6 are distributing nginx 1.14 and 1.16 vulnerable versions as a dependency and configuration could be modified making it vulnerable. Red Hat CloudForms Management Engine 5.9 and 5.10 are not vulnerable by default as are not using error_page variable in the nginx configuration. However, both mentioned builds ships vulnerable nginx versions 1.10 and 1.14 respectively. CloudForms 5.11 does not use nginx directly hence it is not vulnerable. Red Hat Quay's configuration of nginx means it's not affected by this issue. It doesn't use error_page to do a 302 redirect. It's only use of error_page uses a named location ie: error_page 404 /404.html; location = /40x.html { } error_page 500 502 503 504 /50x.html; location = /50x.html { }
Меры по смягчению последствий
To mitigate this issue, use a named location instead of having the error_page handler do the redirect, this configuration is not vulnerable to request smuggling on all versions of NGINX we tested. server { listen 80; server_name localhost; error_page 401 @401; location / { return 401; } location @401 { return 302 http://example.org; } }
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| CloudForms Management Engine 5 | nginx | Will not fix | ||
| Red Hat Enterprise Linux 8 | nginx:1.14/nginx | Will not fix | ||
| Red Hat Software Collections | rh-nginx110-nginx | Will not fix | ||
| Red Hat Software Collections | rh-nginx114-nginx | Will not fix | ||
| Red Hat Ansible Tower 3.6 for RHEL 7 | ansible-tower-36/ansible-tower | Fixed | RHSA-2021:0778 | 09.03.2021 |
| Red Hat Ansible Tower 3.7 for RHEL 7 | ansible-tower-37/ansible-tower-rhel7 | Fixed | RHSA-2021:0779 | 09.03.2021 |
| Red Hat Enterprise Linux 8 | nginx | Fixed | RHSA-2020:5495 | 15.12.2020 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7 | rh-nginx116-nginx | Fixed | RHSA-2020:2817 | 02.07.2020 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS | rh-nginx116-nginx | Fixed | RHSA-2020:2817 | 02.07.2020 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS | rh-nginx116-nginx | Fixed | RHSA-2020:2817 | 02.07.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
NGINX before 1.17.7, with certain error_page configurations, allows HT ...
EPSS
5.3 Medium
CVSS3