[Bug 243952] www/nginx: Versions < 1.17.7, with certain error_page configurations, allows HTTP request smuggling (CVE-2019-20372)
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Fri Feb 7 04:38:51 UTC 2020
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=243952
Bug ID: 243952
Summary: www/nginx: Versions < 1.17.7, with certain error_page
configurations, allows HTTP request smuggling
(CVE-2019-20372)
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-201
9-20372
OS: Any
Status: New
Keywords: needs-patch, needs-qa, security
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: joneum at FreeBSD.org
Reporter: koobs at FreeBSD.org
CC: ports-secteam at FreeBSD.org
Flags: maintainer-feedback?(joneum at FreeBSD.org)
Assignee: joneum at FreeBSD.org
Flags: merge-quarterly?
NGINX before 1.17.7, with certain error_page configurations, allows HTTP
request smuggling, as demonstrated by the ability of an attacker to read
unauthorized web pages in environments where NGINX is being fronted by a load
balancer.
https://nginx.org/en/CHANGES doesn't reference the CVE, only stating:
*) Bugfix: requests with bodies were handled incorrectly when returning
redirections with the "error_page" directive; the bug had appeared in
0.7.12.
Further upstream and other references exist in the Mitre CVE entry. The
upstream commit reference is:
https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e
The 1.16.x stable branch may or may not have received a backport of the
patch(es) to fix the issue. This should be investigated/verified. A manual
backport may be necessary.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list