ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.
References
Link | Resource |
---|---|
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 | Patch Third Party Advisory |
https://github.com/openresty/lua-nginx-module/pull/1654 | Patch Third Party Advisory |
https://news.ycombinator.com/item?id=26712562 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210507-0005/ | Third Party Advisory |
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 | Patch Third Party Advisory |
https://github.com/openresty/lua-nginx-module/pull/1654 | Patch Third Party Advisory |
https://news.ycombinator.com/item?id=26712562 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210507-0005/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 - Patch, Third Party Advisory | |
References | () https://github.com/openresty/lua-nginx-module/pull/1654 - Patch, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=26712562 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210507-0005/ - Third Party Advisory |
Information
Published : 2021-04-06 19:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36309
Mitre link : CVE-2020-36309
CVE.ORG link : CVE-2020-36309
JSON object : View
Products Affected
openresty
- lua-nginx-module
CWE