nginx nginx Popular web server

Do you want an email whenever new security vulnerabilities are reported in nginx?

@nginxorg Tweets

RT @nginx: Today we released updates in response to a recently discovered, low severity vulnerability. #NGINX Open Source, NGINX Ingress Co…
Tue May 25 17:08:35 +0000 2021

RT @W3Techs: Nginx is now the most popular web server, overtaking Apache https://t.co/6ZVOa70W08 #Nginx @nginxorg
Tue May 04 18:07:04 +0000 2021

Set a reminder for this week's live coding session with @linux_lenny. May 5 at 8pm CEST #javascript #nginx #njs https://t.co/Gu64HPaPPH
Mon May 03 23:10:26 +0000 2021

Join @linux_lenny live on YouTube at 10pm CET as he builds with #NGINXUnit and Go #nginx @golang https://t.co/um3jc0E0dg
Wed Apr 14 17:11:00 +0000 2021

RT @nginx: 待望の【O'Reilly】NGINX Cookbook日本語版がついに完成! 100を超えるユースケースとともに、実際のアプリケーション配信の設定方法をわかりやすく解説。NGINXクックブック(設定レシピ集)を読めば、NGINXを最大限に活用する方法が丸わ…
Tue Apr 13 14:39:20 +0000 2021

By the Year

In 2021 there have been 2 vulnerabilities in nginx with an average score of 9.8 out of ten. Last year nginx had 1 security vulnerability published. That is, 1 more vulnerability have already been reported in 2021 as compared to last year. However, the average CVE base score of the vulnerabilities in 2021 is greater by 4.50.

Year Vulnerabilities Average Score
2021 2 9.80
2020 1 5.30
2019 3 7.17
2018 3 7.03

It may take a day or so for new nginx vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent nginx Security Vulnerabilities

NGINX before 1.13.6 has a buffer overflow for years

CVE-2017-20005 9.8 - Critical - June 06, 2021

NGINX before 1.13.6 has a buffer overflow for years that exceed four digits, as demonstrated by a file with a modification date in 1969 that causes an integer overflow (or a false modification date far in the future), when encountered by the autoindex module.

Integer Overflow or Wraparound

A security issue in nginx resolver was identified, which might

CVE-2021-23017 9.8 - Critical - June 01, 2021

A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

off-by-five

NGINX before 1.17.7, with certain error_page configurations

CVE-2019-20372 5.3 - Medium - January 09, 2020

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

HTTP Request Smuggling

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation

CVE-2019-9511 7.5 - High - August 13, 2019

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

Allocation of Resources Without Limits or Throttling

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service

CVE-2019-9513 7.5 - High - August 13, 2019

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service

CVE-2019-9516 6.5 - Medium - August 13, 2019

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

Allocation of Resources Without Limits or Throttling

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption

CVE-2018-16843 7.5 - High - November 07, 2018

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.

Resource Exhaustion

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage

CVE-2018-16844 7.5 - High - November 07, 2018

nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.

Resource Exhaustion

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might

CVE-2018-16845 6.1 - Medium - November 07, 2018

nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

Infinite Loop

nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might

CVE-2009-4487 - January 13, 2010

nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for nginx or by NGINX? Click the Watch button to subscribe.

NGINX
Vendor

nginx
Popular web server

subscribe