First published: Tue Apr 06 2021(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openresty Lua-nginx-module | <0.10.16 | |
debian/libnginx-mod-http-lua | 1:0.10.23-1 1:0.10.27-3 | |
debian/nginx | <=1.18.0-6.1+deb11u3 | 1.22.1-9 1.26.0-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-36309.
The affected software is OpenResty with nginx versions 1.14.0-0ubuntu1.10, 1.18.0-0ubuntu1.3, and 1.10.3-0ubuntu0.16.04.5+.
The fix/remedy for this vulnerability is to update OpenResty/nginx to versions 1.14.0-0ubuntu1.10, 1.18.0-0ubuntu1.3, or 1.10.3-0ubuntu0.16.04.5+ depending on the affected software version.
Yes, unsafe characters can be used in the URI, request, or response headers when using the ngx_http_lua_module API.
You can find more information about this vulnerability at the MITRE CVE website (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36309), the OpenResty lua-nginx-module GitHub pull request (https://github.com/openresty/lua-nginx-module/pull/1654), and the Ubuntu security notices (https://ubuntu.com/security/notices/USN-5371-1).