445
VMScore

CVE-2020-36309

Published: 06/04/2021 Updated: 03/06/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

ngx_http_lua_module (aka lua-nginx-module) prior to 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openresty lua-nginx-module

Vendor Advisories

Debian Bug report logs - #986787 CVE-2020-36309 Package: libnginx-mod-http-lua; Maintainer for libnginx-mod-http-lua is Debian Nginx Maintainers <pkg-nginx-maintainers@alioth-listsdebiannet>; Source for libnginx-mod-http-lua is src:nginx (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: M ...
nginx could be made to redirect network traffic ...
A security issue was fixed in nginx’s lua module ...
Several security issues were fixed in nginx ...