ID CVE-2020-11080
Summary In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
References
Vulnerable Configurations
  • cpe:2.3:a:nghttp2:nghttp2:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.12:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.12:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.13:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.13:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.14:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.14:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:0.7.15:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:0.7.15:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.21.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.24.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.25.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.26.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.27.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.27.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.28.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.28.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.29.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.29.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.30.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.30.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.31.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.31.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.32.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.32.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.32.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.33.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.34.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.34.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.35.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.35.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.35.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.36.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.37.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.38.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.39.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.39.1:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.39.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.39.2:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.39.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nghttp2:nghttp2:1.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:nghttp2:nghttp2:1.40.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_extensibility_workbench:14.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:banking_extensibility_workbench:14.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*
    cpe:2.3:a:oracle:graalvm:19.3.2:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:oracle:graalvm:20.1.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.17:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.17:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.19:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.19:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.20:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.20:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.21:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.21:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.22:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.22:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.23:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.23:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.24:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.24:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.25:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.25:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.26:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.26:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.27:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.27:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.28:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.28:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.29:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.29:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.3.30:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.3.30:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.17:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.17:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.19:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.19:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.20:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.20:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.21:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.21:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.22:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.22:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.23:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.23:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.24:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.24:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.25:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.25:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.26:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.26:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.27:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.27:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.28:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.28:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.4.29:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.4.29:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 17-10-2021 - 08:15)
Impact:
Exploitability:
CWE CWE-707
CAPEC
  • Blind SQL Injection
    Blind SQL Injection results from an insufficient mitigation for SQL Injection. Although suppressing database error messages are considered best practice, the suppression alone is not sufficient to prevent SQL Injection. Blind SQL Injection is a form of SQL Injection that overcomes the lack of error messages. Without the error messages that facilitate SQL Injection, the adversary constructs input strings that probe the target through simple Boolean SQL expressions. The adversary can determine if the syntax and structure of the injection was successful based on whether the query was executed or not. Applied iteratively, the adversary determines how and where the target is vulnerable to SQL Injection.
  • XQuery Injection
    This attack utilizes XQuery to probe and attack server systems; in a similar manner that SQL Injection allows an attacker to exploit SQL calls to RDBMS, XQuery Injection uses improperly validated data that is passed to XQuery commands to traverse and execute commands that the XQuery routines have access to. XQuery injection can be used to enumerate elements on the victim's environment, inject commands to the local host, or execute queries to remote files and data sources.
  • Postfix, Null Terminate, and Backslash
    If a string is passed through a filter of some kind, then a terminal NULL may not be valid. Using alternate representation of NULL allows an attacker to embed the NULL mid-string while postfixing the proper data so that the filter is avoided. One example is a filter that looks for a trailing slash character. If a string insertion is possible, but the slash must exist, an alternate encoding of NULL in mid-string may be used.
  • Generic Cross-Browser Cross-Domain Theft
    An attacker makes use of Cascading Style Sheets (CSS) injection to steal data cross domain from the victim's browser. The attack works by abusing the standards relating to loading of CSS: 1. Send cookies on any load of CSS (including cross-domain) 2. When parsing returned CSS ignore all data that does not make sense before a valid CSS descriptor is found by the CSS parser By having control of some text in the victim's domain, the attacker is able to inject a seemingly valid CSS string. It does not matter if this CSS string is preceded by other data. The CSS parser will still locate the CSS string. If the attacker is able to control two injection points, one before the cross domain data that the attacker is interested in receiving and the other one after, the attacker can use this attack to steal all of the data in between these two CSS injection points when referencing the injected CSS while performing rendering on the site that the attacker controls. When rendering, the CSS parser will detect the valid CSS string to parse and ignore the data that "does not make sense". That data will simply be rendered. That data is in fact the data that the attacker just stole cross domain. The stolen data may contain sensitive information, such CSRF protection tokens.
  • Web Services Protocol Manipulation
    An adversary manipulates a web service related protocol to cause a web application or service to react differently than intended. This can either be performed through the manipulation of call parameters to include unexpected values, or by changing the called function to one that should normally be restricted or limited. By leveraging this pattern of attack, the adversary is able to gain access to data or resources normally restricted, or to cause the application or service to crash.
  • XPath Injection
    An attacker can craft special user-controllable input consisting of XPath expressions to inject the XML database and bypass authentication or glean information that he normally would not be able to. XPath Injection enables an attacker to talk directly to the XML database, thus bypassing the application completely. XPath Injection results from the failure of an application to properly sanitize input used as part of dynamic XPath expressions used to query an XML database.
  • HTTP Response Splitting
    This attack uses a maliciously-crafted HTTP request in order to cause a vulnerable web server to respond with an HTTP response stream that will be interpreted by the client as two separate responses instead of one. This is possible when user-controlled input is used unvalidated as part of the response headers. The target software, the client, will interpret the injected header as being a response to a second request, thereby causing the maliciously-crafted contents be displayed and possibly cached.
  • Using Slashes and URL Encoding Combined to Bypass Validation Logic
    This attack targets the encoding of the URL combined with the encoding of the slash characters. An attacker can take advantage of the multiple ways of encoding a URL and abuse the interpretation of the URL. A URL may contain special character that need special syntax handling in order to be interpreted. Special characters are represented using a percentage character followed by two digits representing the octet code of the original character (%HEX-CODE). For instance US-ASCII space character would be represented with %20. This is often referred as escaped ending or percent-encoding. Since the server decodes the URL from the requests, it may restrict the access to some URL paths by validating and filtering out the URL requests it received. An attacker will try to craft an URL with a sequence of special characters which once interpreted by the server will be equivalent to a forbidden URL. It can be difficult to protect against this attack since the URL can contain other format of encoding such as UTF-8 encoding, Unicode-encoding, etc.
  • Embedding NULL Bytes
    An attacker embeds one or more null bytes in input to the target software. This attack relies on the usage of a null-valued byte as a string terminator in many environments. The goal is for certain components of the target software to stop processing the input when it encounters the null byte(s).
  • Using Escaped Slashes in Alternate Encoding
    This attack targets the use of the backslash in alternate encoding. An attacker can provide a backslash as a leading character and causes a parser to believe that the next character is special. This is called an escape. By using that trick, the attacker tries to exploit alternate ways to encode the same character which leads to filter problems and opens avenues to attack.
  • SOAP Manipulation
    Simple Object Access Protocol (SOAP) is used as a communication protocol between a client and server to invoke web services on the server. It is an XML-based protocol, and therefore suffers from many of the same shortcomings as other XML-based protocols. Adviseries can make use these shortcomings to mount an denial of service attack, disclose information and execute arbitrary code. This includes a SOAP parameter tampering attack in which an attacker sends a SOAP message where the field values are other than what the server is likely to expect in order to precipitate non-standard server behavior.
  • HTTP Request Smuggling
    HTTP Request Smuggling results from the discrepancies in parsing HTTP requests between HTTP entities such as web caching proxies or application firewalls. Entities such as web servers, web caching proxies, application firewalls or simple proxies often parse HTTP requests in slightly different ways. Under specific situations where there are two or more such entities in the path of the HTTP request, a specially crafted request is seen by two attacked entities as two different sets of requests. This allows certain requests to be smuggled through to a second entity without the first one realizing it.
  • SQL Injection
    This attack exploits target software that constructs SQL statements based on user input. An attacker crafts input strings so that when the target software constructs SQL statements based on the input, the resulting SQL statement performs actions other than those the application intended. SQL Injection results from failure of the application to appropriately validate input. When specially crafted user-controlled input consisting of SQL syntax is used without proper validation as part of SQL queries, it is possible to glean information from the database in ways not envisaged during application design. Depending upon the database and the design of the application, it may also be possible to leverage injection to have the database execute system-related commands of the attackers' choice. SQL Injection enables an attacker to talk directly to the database, thus bypassing the application completely. Successful injection can cause information disclosure as well as ability to add or modify data in the database. In order to successfully inject SQL and retrieve information from a database, an attacker:
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
  • Inter-component Protocol Manipulation
    Inter-component protocols are used to communicate between different software and hardware modules within a single computer. Common examples are: interrupt signals and data pipes. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.
  • XML Injection
    An attacker utilizes crafted XML user-controllable input to probe, attack, and inject data into the XML database, using techniques similar to SQL injection. The user-controllable input can allow for unauthorized viewing of data, bypassing authentication or the front-end application for direct XML database access, and possibly altering database information.
  • Data Interchange Protocol Manipulation
    Data Interchange Protocols are used to transmit structured data between entities. These protocols are often specific to a particular domain (B2B: purchase orders, invoices, transport logistics and waybills, medical records). They are often, but not always, XML-based. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.
  • Using Leading 'Ghost' Character Sequences to Bypass Input Filters
    Some APIs will strip certain leading characters from a string of parameters. An adversary can intentionally introduce leading "ghost" characters (extra characters that don't affect the validity of the request at the API layer) that enable the input to pass the filters and therefore process the adversary's input. This occurs when the targeted API will accept input data in several syntactic forms and interpret it in the equivalent semantic way, while the filter does not take into account the full spectrum of the syntactic forms acceptable to the targeted API.
  • Exploiting Multiple Input Interpretation Layers
    An attacker supplies the target software with input data that contains sequences of special characters designed to bypass input validation logic. This exploit relies on the target making multiples passes over the input data and processing a "layer" of special characters with each pass. In this manner, the attacker can disguise input that would otherwise be rejected as invalid by concealing it with layers of special/escape characters that are stripped off by subsequent processing steps. The goal is to first discover cases where the input validation layer executes before one or more parsing layers. That is, user input may go through the following logic in an application: <parser1> --> <input validator> --> <parser2>. In such cases, the attacker will need to provide input that will pass through the input validator, but after passing through parser2, will be converted into something that the input validator was supposed to stop.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 1844929
title CVE-2020-11080 nghttp2: overly large SETTINGS frames can lead to DoS
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 8 is installed
      oval oval:com.redhat.rhba:tst:20193384074
    • OR
      • AND
        • comment libnghttp2 is earlier than 0:1.33.0-3.el8_2.1
          oval oval:com.redhat.rhsa:tst:20202755001
        • comment libnghttp2 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20192692002
      • AND
        • comment libnghttp2-devel is earlier than 0:1.33.0-3.el8_2.1
          oval oval:com.redhat.rhsa:tst:20202755003
        • comment libnghttp2-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20192692004
      • AND
        • comment nghttp2 is earlier than 0:1.33.0-3.el8_2.1
          oval oval:com.redhat.rhsa:tst:20202755005
        • comment nghttp2 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20192692006
      • AND
        • comment nghttp2-debugsource is earlier than 0:1.33.0-3.el8_2.1
          oval oval:com.redhat.rhsa:tst:20202755007
        • comment nghttp2-debugsource is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20192692008
rhsa
id RHSA-2020:2755
released 2020-06-25
severity Important
title RHSA-2020:2755: nghttp2 security update (Important)
rpms
  • servicemesh-proxy-0:1.1.2-3.el8
  • servicemesh-proxy-0:1.0.10-3.el8
  • jbcs-httpd24-curl-0:7.64.1-36.jbcs.el6
  • jbcs-httpd24-curl-0:7.64.1-36.jbcs.el7
  • jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el6
  • jbcs-httpd24-curl-debuginfo-0:7.64.1-36.jbcs.el7
  • jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-debuginfo-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-devel-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-manual-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-selinux-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-httpd-tools-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el6
  • jbcs-httpd24-libcurl-0:7.64.1-36.jbcs.el7
  • jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el6
  • jbcs-httpd24-libcurl-devel-0:7.64.1-36.jbcs.el7
  • jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el6
  • jbcs-httpd24-mod_cluster-native-0:1.3.14-4.Final_redhat_2.jbcs.el7
  • jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el6
  • jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.14-4.Final_redhat_2.jbcs.el7
  • jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el6
  • jbcs-httpd24-mod_http2-0:1.15.7-3.jbcs.el7
  • jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el6
  • jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-3.jbcs.el7
  • jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el6
  • jbcs-httpd24-mod_jk-ap24-0:1.2.48-4.redhat_1.jbcs.el7
  • jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el6
  • jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-4.redhat_1.jbcs.el7
  • jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el6
  • jbcs-httpd24-mod_jk-manual-0:1.2.48-4.redhat_1.jbcs.el7
  • jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-mod_ldap-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el6
  • jbcs-httpd24-mod_md-1:2.0.8-24.jbcs.el7
  • jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el6
  • jbcs-httpd24-mod_md-debuginfo-1:2.0.8-24.jbcs.el7
  • jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el6
  • jbcs-httpd24-mod_proxy_html-1:2.4.37-57.jbcs.el7
  • jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el6
  • jbcs-httpd24-mod_security-0:2.9.2-51.GA.jbcs.el7
  • jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el6
  • jbcs-httpd24-mod_security-debuginfo-0:2.9.2-51.GA.jbcs.el7
  • jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el6
  • jbcs-httpd24-mod_session-0:2.4.37-57.jbcs.el7
  • jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el6
  • jbcs-httpd24-mod_ssl-1:2.4.37-57.jbcs.el7
  • jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el6
  • jbcs-httpd24-nghttp2-0:1.39.2-25.jbcs.el7
  • jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el6
  • jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-25.jbcs.el7
  • jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el6
  • jbcs-httpd24-nghttp2-devel-0:1.39.2-25.jbcs.el7
  • jbcs-httpd24-openssl-pkcs11-0:0.4.10-7.jbcs.el7
  • jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-7.jbcs.el7
  • libnghttp2-0:1.33.0-3.el8_2.1
  • libnghttp2-debuginfo-0:1.33.0-3.el8_2.1
  • libnghttp2-devel-0:1.33.0-3.el8_2.1
  • nghttp2-0:1.33.0-3.el8_2.1
  • nghttp2-debuginfo-0:1.33.0-3.el8_2.1
  • nghttp2-debugsource-0:1.33.0-3.el8_2.1
  • httpd24-libnghttp2-0:1.7.1-8.el6.1
  • httpd24-libnghttp2-0:1.7.1-8.el7.1
  • httpd24-libnghttp2-devel-0:1.7.1-8.el6.1
  • httpd24-libnghttp2-devel-0:1.7.1-8.el7.1
  • httpd24-nghttp2-0:1.7.1-8.el6.1
  • httpd24-nghttp2-0:1.7.1-8.el7.1
  • httpd24-nghttp2-debuginfo-0:1.7.1-8.el6.1
  • httpd24-nghttp2-debuginfo-0:1.7.1-8.el7.1
  • libnghttp2-0:1.33.0-3.el8_1.1
  • libnghttp2-debuginfo-0:1.33.0-3.el8_1.1
  • libnghttp2-devel-0:1.33.0-3.el8_1.1
  • nghttp2-0:1.33.0-3.el8_1.1
  • nghttp2-debuginfo-0:1.33.0-3.el8_1.1
  • nghttp2-debugsource-0:1.33.0-3.el8_1.1
  • nodejs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-debuginfo-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-debugsource-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-devel-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-docs-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-full-i18n-1:12.18.2-1.module+el8.1.0+7232+f8b5ede5
  • nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45
  • nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45
  • npm-1:6.14.5-1.12.18.2.1.module+el8.1.0+7232+f8b5ede5
  • nodejs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-debuginfo-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-debugsource-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-devel-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-docs-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-full-i18n-1:10.21.0-3.module+el8.2.0+7071+d2377ea3
  • nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed
  • nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a
  • npm-1:6.14.4-1.10.21.0.3.module+el8.2.0+7071+d2377ea3
  • nodejs-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-debuginfo-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-debugsource-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-devel-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-docs-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-full-i18n-1:10.21.0-3.module+el8.1.0+7070+fe09e702
  • nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed
  • nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a
  • npm-1:6.14.4-1.10.21.0.3.module+el8.1.0+7070+fe09e702
  • libnghttp2-0:1.33.0-1.el8_0.2
  • libnghttp2-debuginfo-0:1.33.0-1.el8_0.2
  • nghttp2-debuginfo-0:1.33.0-1.el8_0.2
  • nghttp2-debugsource-0:1.33.0-1.el8_0.2
  • nodejs-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-debuginfo-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-debugsource-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-devel-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-docs-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-full-i18n-1:12.18.2-1.module+el8.2.0+7233+61d664c1
  • nodejs-nodemon-0:1.18.3-1.module+el8.1.0+3369+37ae6a45
  • nodejs-packaging-0:17-3.module+el8.1.0+3369+37ae6a45
  • npm-1:6.14.5-1.12.18.2.1.module+el8.2.0+7233+61d664c1
  • rh-nodejs12-nodejs-0:12.18.2-1.el7
  • rh-nodejs12-nodejs-debuginfo-0:12.18.2-1.el7
  • rh-nodejs12-nodejs-devel-0:12.18.2-1.el7
  • rh-nodejs12-nodejs-docs-0:12.18.2-1.el7
  • rh-nodejs12-npm-0:6.14.5-12.18.2.1.el7
  • nodejs-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-debuginfo-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-debugsource-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-devel-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-docs-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-full-i18n-1:10.21.0-3.module+el8.0.0+7067+054302d1
  • nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed
  • nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a
  • npm-1:6.14.4-1.10.21.0.3.module+el8.0.0+7067+054302d1
  • rh-nodejs10-nodejs-0:10.21.0-3.el7
  • rh-nodejs10-nodejs-debuginfo-0:10.21.0-3.el7
  • rh-nodejs10-nodejs-devel-0:10.21.0-3.el7
  • rh-nodejs10-nodejs-docs-0:10.21.0-3.el7
  • rh-nodejs10-npm-0:6.14.4-10.21.0.3.el7
refmap via4
confirm https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
debian DSA-4696
fedora
  • FEDORA-2020-43d5a372fc
  • FEDORA-2020-f7d15c8b77
misc
suse openSUSE-SU-2020:0802
Last major update 17-10-2021 - 08:15
Published 03-06-2020 - 23:15
Last modified 17-10-2021 - 08:15
Back to Top