First published: Mon Jan 13 2020(Updated: )
Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could possibly use this issue to perform HTTP request smuggling attacks and access resources contrary to expectations.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/nginx-common | <1.16.1-0ubuntu2.1 | 1.16.1-0ubuntu2.1 |
=19.10 | ||
All of | ||
ubuntu/nginx-core | <1.16.1-0ubuntu2.1 | 1.16.1-0ubuntu2.1 |
=19.10 | ||
All of | ||
ubuntu/nginx-extras | <1.16.1-0ubuntu2.1 | 1.16.1-0ubuntu2.1 |
=19.10 | ||
All of | ||
ubuntu/nginx-full | <1.16.1-0ubuntu2.1 | 1.16.1-0ubuntu2.1 |
=19.10 | ||
All of | ||
ubuntu/nginx-light | <1.16.1-0ubuntu2.1 | 1.16.1-0ubuntu2.1 |
=19.10 | ||
All of | ||
ubuntu/nginx-common | <1.15.9-0ubuntu1.2 | 1.15.9-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/nginx-core | <1.15.9-0ubuntu1.2 | 1.15.9-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/nginx-extras | <1.15.9-0ubuntu1.2 | 1.15.9-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/nginx-full | <1.15.9-0ubuntu1.2 | 1.15.9-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/nginx-light | <1.15.9-0ubuntu1.2 | 1.15.9-0ubuntu1.2 |
=19.04 | ||
All of | ||
ubuntu/nginx-common | <1.14.0-0ubuntu1.7 | 1.14.0-0ubuntu1.7 |
=18.04 | ||
All of | ||
ubuntu/nginx-core | <1.14.0-0ubuntu1.7 | 1.14.0-0ubuntu1.7 |
=18.04 | ||
All of | ||
ubuntu/nginx-extras | <1.14.0-0ubuntu1.7 | 1.14.0-0ubuntu1.7 |
=18.04 | ||
All of | ||
ubuntu/nginx-full | <1.14.0-0ubuntu1.7 | 1.14.0-0ubuntu1.7 |
=18.04 | ||
All of | ||
ubuntu/nginx-light | <1.14.0-0ubuntu1.7 | 1.14.0-0ubuntu1.7 |
=18.04 | ||
All of | ||
ubuntu/nginx-common | <1.10.3-0ubuntu0.16.04.5 | 1.10.3-0ubuntu0.16.04.5 |
=16.04 | ||
All of | ||
ubuntu/nginx-core | <1.10.3-0ubuntu0.16.04.5 | 1.10.3-0ubuntu0.16.04.5 |
=16.04 | ||
All of | ||
ubuntu/nginx-extras | <1.10.3-0ubuntu0.16.04.5 | 1.10.3-0ubuntu0.16.04.5 |
=16.04 | ||
All of | ||
ubuntu/nginx-full | <1.10.3-0ubuntu0.16.04.5 | 1.10.3-0ubuntu0.16.04.5 |
=16.04 | ||
All of | ||
ubuntu/nginx-light | <1.10.3-0ubuntu0.16.04.5 | 1.10.3-0ubuntu0.16.04.5 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this nginx vulnerability is CVE-2019-20372.
The severity of CVE-2019-20372 is moderate.
The affected software versions are: nginx-common 1.16.1-0ubuntu2.1, nginx-core 1.16.1-0ubuntu2.1, nginx-extras 1.16.1-0ubuntu2.1, nginx-full 1.16.1-0ubuntu2.1, nginx-light 1.16.1-0ubuntu2.1, nginx-common 1.15.9-0ubuntu1.2, nginx-core 1.15.9-0ubuntu1.2, nginx-extras 1.15.9-0ubuntu1.2, nginx-full 1.15.9-0ubuntu1.2, nginx-light 1.15.9-0ubuntu1.2, nginx-common 1.14.0-0ubuntu1.7, nginx-core 1.14.0-0ubuntu1.7, nginx-extras 1.14.0-0ubuntu1.7, nginx-full 1.14.0-0ubuntu1.7, nginx-light 1.14.0-0ubuntu1.7, nginx-common 1.10.3-0ubuntu0.16.04.5, nginx-core 1.10.3-0ubuntu0.16.04.5, nginx-extras 1.10.3-0ubuntu0.16.04.5, nginx-full 1.10.3-0ubuntu0.16.04.5, nginx-light 1.10.3-0ubuntu0.16.04.5.
A remote attacker could possibly exploit this vulnerability to perform HTTP request smuggling attacks and access resources contrary to expectations.
To fix CVE-2019-20372, upgrade to the following versions: nginx-common 1.16.1-0ubuntu2.1, nginx-core 1.16.1-0ubuntu2.1, nginx-extras 1.16.1-0ubuntu2.1, nginx-full 1.16.1-0ubuntu2.1, nginx-light 1.16.1-0ubuntu2.1.