CVE-2020-36309

ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openresty:lua-nginx-module:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 - Patch, Third Party Advisory () https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 - Patch, Third Party Advisory
References () https://github.com/openresty/lua-nginx-module/pull/1654 - Patch, Third Party Advisory () https://github.com/openresty/lua-nginx-module/pull/1654 - Patch, Third Party Advisory
References () https://news.ycombinator.com/item?id=26712562 - Third Party Advisory () https://news.ycombinator.com/item?id=26712562 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210507-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210507-0005/ - Third Party Advisory

Information

Published : 2021-04-06 19:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36309

Mitre link : CVE-2020-36309

CVE.ORG link : CVE-2020-36309


JSON object : View

Products Affected

openresty

  • lua-nginx-module