5
CVSSv2

CVE-2020-11724

Published: 12/04/2020 Updated: 29/01/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

An issue exists in OpenResty prior to 1.15.8.4. ngx_http_lua_subrequest.c allows HTTP request smuggling, as demonstrated by the ngx.location.capture API.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openresty openresty

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #964950 nginx: CVE-2020-11724 Package: nginx; Maintainer for nginx is Debian Nginx Maintainers <pkg-nginx-maintainers@alioth-listsdebiannet>; Source for nginx is src:nginx (PTS, buildd, popcon) Reported by: Sylvain Beucler <beuc@beucnet> Date: Mon, 13 Jul 2020 09:15:02 UTC Severity: grave ...
It was reported that the Lua module for Nginx, a high-performance web and reverse proxy server, is prone to a HTTP request smuggling vulnerability For the stable distribution (buster), this problem has been fixed in version 1142-2+deb10u3 We recommend that you upgrade your nginx packages For the detailed security status of nginx please refer t ...
nginx could be made to redirect network traffic ...
A security issue was fixed in nginx’s lua module ...
Several security issues were fixed in nginx ...