{"id":45878,"date":"2022-04-13T00:48:57","date_gmt":"2022-04-12T15:48:57","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-5371-1-nginx-vulnerabilities\/"},"modified":"2022-04-13T16:34:05","modified_gmt":"2022-04-13T07:34:05","slug":"usn-5371-1-nginx-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-5371-1-nginx-vulnerabilities\/","title":{"rendered":"USN-5371-1: nginx vulnerabilities"},"content":{"rendered":"<p>USN-5371-1: nginx vulnerabilities<\/p>\n<p>It was discovered that nginx Lua module mishandled certain inputs.<br \/>\nAn attacker could possibly use this issue to perform an HTTP Request<br \/>\nSmuggling attack. This issue only affects Ubuntu 18.04 LTS and<br \/>\nUbuntu 20.04 LTS. (CVE-2020-11724)<\/p>\n<p>It was discovered that nginx Lua module mishandled certain inputs.<br \/>\nAn attacker could possibly use this issue to disclose sensitive<br \/>\ninformation. This issue only affects Ubuntu 18.04 LTS and<br \/>\nUbuntu 20.04 LTS. (CVE-2020-36309)<\/p>\n<p>It was discovered that nginx mishandled the use of<br \/>\ncompatible certificates among multiple encryption protocols.<br \/>\nIf a remote attacker were able to intercept the communication,<br \/>\nthis issue could be used to redirect traffic between subdomains.<br \/>\n(CVE-2021-3618)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5371-1\" target=\"_blank\" rel=\"noopener\">USN-5371-1: nginx vulnerabilities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-5371-1: nginx vulnerabilities It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-11724) It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to disclose sensitive information. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-36309) It was discovered that nginx mishandled the use of compatible certificates among multiple encryption protocols. If a remote attacker were able to intercept the communication, this issue could be used to redirect traffic between subdomains. (CVE-2021-3618) Source: USN-5371-1: nginx vulnerabilities<\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-45878","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=45878"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45878\/revisions"}],"predecessor-version":[{"id":45879,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/45878\/revisions\/45879"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=45878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=45878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=45878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}