Lucene search

K
nessusThis script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_98952
HistoryNov 05, 2018 - 12:00 a.m.

Nginx < 1.5.7 ngx_parse_http Security Bypass

2018-11-0500:00:00
This script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
23

According to the self-reported version in the Server response header, the installed version of nginx is greater than 0.8.41 but prior to 1.4.4 / 1.5.7. It is, therefore, affected by a security bypass vulnerability in β€˜ngx_http_parse.c’ when a file with a space at the end of the URI is requested.

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data
VendorProductVersionCPE
nginxnginx*cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:*