Vulnerability Details : CVE-2020-36309
ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.
Products affected by CVE-2020-36309
- cpe:2.3:a:openresty:lua-nginx-module:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36309
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36309
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
References for CVE-2020-36309
-
https://github.com/openresty/lua-nginx-module/pull/1654
bugfix: ensured arguments of APIs mutating uri or request/response headers do not contain unsafe characters. by doujiang24 · Pull Request #1654 · openresty/lua-nginx-module · GitHubPatch;Third Party Advisory
-
https://news.ycombinator.com/item?id=26712562
Hi from the Pages team! This was such a great find and can't thank you enough fo... | Hacker NewsThird Party Advisory
-
https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16
Comparing v0.10.15...v0.10.16 · openresty/lua-nginx-module · GitHubPatch;Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20210507-0005/
CVE-2020-36309 OpenResty Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
Jump to