Improper input validation in OpenResty - CVE-2018-9230

 

Improper input validation in OpenResty - CVE-2018-9230

Published: April 4, 2018


Vulnerability identifier: #VU11517
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-9230
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: OpenResty Inc.
Affected software:
OpenResty

Detailed vulnerability description

The vulnerability allows a remote unauthenticated attacker to bypass security restrictions on the target system.

The weakness exists due to improper validation of URI parameter values when handling the ngx.req.get_uri_args and ngx.req.get_post_args functions with more than 100 parameters. A remote attacker can use GET and POST requests that contain more than 100 parameters in the affected functions, where malicious input is included in parameters after the first 100, trigger URI parameter overflow and bypass security restrictions.

How to mitigate CVE-2018-9230

Update to version 1.13.6.1.

Sources