Description
A vulnerability exists in the ngx_http_scgi_module and ngx_http_uwsgi_module modules that may result in excessive memory allocation or an over-read of data. When scgi_pass or uwsgi_pass is configured, an unauthenticated attacker with man-in-the-middle (MITM) ability to control responses from an upstream server may be able to read the memory of the NGINX worker process or restart it. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Problem types
CWE-789: Memory Allocation with Excessive Size Value
CWE-823: Use of Out-of-range Pointer Offset
Product status
R37 (custom) before *
R36 (custom) before R36 P4
R32 (custom) before R32 P6
1.31.0 (semver) before *
0.8.42 (semver) before 1.30.1
Credits
F5 acknowledges Zhenpeng (Leo) Lin of depthfirst for bringing this issue to our attention and following the highest standards of coordinated disclosure.
References
my.f5.com/manage/s/article/K000161027