Lucene search

K
redhatcveRedhat.comRH:CVE-2019-20372
HistoryJan 13, 2020 - 2:39 a.m.

CVE-2019-20372

2020-01-1302:39:12
redhat.com
access.redhat.com
81

0.003 Low

EPSS

Percentile

68.2%

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

Mitigation

To mitigate this issue, use a named location instead of having the error_page handler do the redirect, this configuration is not vulnerable to request smuggling on all versions of NGINX we tested.
server {
listen 80;
server_name localhost;
error_page 401 @401;
location / {
return 401;
}
location @401 {
return 302 <http://example.org>;
}
}