NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "13.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.1"
}
]
}
]
[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2019-20372-62ca3ceb",
"target": {
"file": "src/http/ngx_http_special_response.c",
"function": "ngx_http_send_error_page"
},
"digest": {
"length": 1457.0,
"function_hash": "248396389108547749369241191006484398262"
},
"signature_version": "v1",
"source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2019-20372-7b36d8bf",
"target": {
"file": "src/http/ngx_http_special_response.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"137291644867612448719368415384420215080",
"240257681029049262992914975940936978256",
"103973782483082902889366172146365580787"
]
},
"signature_version": "v1",
"source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20372.json"