NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
[ { "source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e", "target": { "function": "ngx_http_send_error_page", "file": "src/http/ngx_http_special_response.c" }, "signature_type": "Function", "deprecated": false, "signature_version": "v1", "digest": { "function_hash": "248396389108547749369241191006484398262", "length": 1457.0 }, "id": "CVE-2019-20372-62ca3ceb" }, { "source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e", "target": { "file": "src/http/ngx_http_special_response.c" }, "signature_type": "Line", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "137291644867612448719368415384420215080", "240257681029049262992914975940936978256", "103973782483082902889366172146365580787" ], "threshold": 0.9 }, "id": "CVE-2019-20372-7b36d8bf" } ]