NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
{ "vanir_signatures": [ { "id": "CVE-2019-20372-62ca3ceb", "source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e", "deprecated": false, "signature_version": "v1", "signature_type": "Function", "digest": { "length": 1457.0, "function_hash": "248396389108547749369241191006484398262" }, "target": { "file": "src/http/ngx_http_special_response.c", "function": "ngx_http_send_error_page" } }, { "id": "CVE-2019-20372-7b36d8bf", "source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e", "deprecated": false, "signature_version": "v1", "signature_type": "Line", "digest": { "threshold": 0.9, "line_hashes": [ "137291644867612448719368415384420215080", "240257681029049262992914975940936978256", "103973782483082902889366172146365580787" ] }, "target": { "file": "src/http/ngx_http_special_response.c" } } ] }