Vulnerabilities/

Nginx Restriction Bypass via Space Character in URI

Severity:
High

Description

A vulnerability in Nginx allows attackers to bypass security restrictions in specific configurations by exploiting a flaw in request URI processing. When an unescaped space character is followed by certain characters, some security checks on the request URI may be bypassed.

Recommendation

To mitigate this vulnerability, upgrade Nginx to the latest version. As a temporary workaround, apply the following configuration within each server{} block:

  if ($request_uri ~ " ") {
      return 444;
  }

This configuration prevents requests containing spaces from being processed.

References

Related Issues

Tags:
Nginx
Security Bypass
Request Processing
Anything's wrong? Let us know Last updated on May 13, 2024

This issue is available in SmartScanner Professional

See Pricing