Nginx Restriction Bypass via Space Character in URI

Impact: High


A vulnerability in Nginx allows attackers to bypass security restrictions in specific configurations by exploiting a flaw in request URI processing. When an unescaped space character is followed by certain characters, some security checks on the request URI may be bypassed.


To mitigate this vulnerability, upgrade Nginx to the latest version. As a temporary workaround, apply the following configuration within each server{} block:

  if ($request_uri ~ " ") {
      return 444;

This configuration prevents requests containing spaces from being processed.


Last updated on May 13, 2024

This issue is available in SmartScanner Professional

See Pricing