NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
[
{
"source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e",
"signature_version": "v1",
"signature_type": "Function",
"target": {
"function": "ngx_http_send_error_page",
"file": "src/http/ngx_http_special_response.c"
},
"id": "CVE-2019-20372-62ca3ceb",
"digest": {
"length": 1457.0,
"function_hash": "248396389108547749369241191006484398262"
},
"deprecated": false
},
{
"source": "https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e",
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "src/http/ngx_http_special_response.c"
},
"id": "CVE-2019-20372-7b36d8bf",
"digest": {
"line_hashes": [
"137291644867612448719368415384420215080",
"240257681029049262992914975940936978256",
"103973782483082902889366172146365580787"
],
"threshold": 0.9
},
"deprecated": false
}
]