nginx package in Lucid Lynx allows null byte vulnerability in certain configurations
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
nginx (Ubuntu) |
Fix Released
|
Undecided
|
Steve Beattie |
Bug Description
Binary package hint: nginx
The version of nginx provided in Lucid Lynx is out-of-date. In particular, it is missing a commit (r3528 from svn://svn.
The current behavior is dangerous when nginx is acting as a web server in front of a FastCGI server (in particular, a PHP-FCGI server). By using the null byte to append a different extension (eg: .php) to the URI, an attacker can convince nginx to pass the full URI, including the null byte, through to the FastCGI server. In the case of PHP-FCGI, all of the data after the null byte is discarded. So for instance, http://
This issue may affect nginx packages in other, older Ubuntu releases.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res