|Check Point Reference:||CPAI-2013-3618|
|Date Published:||10 Dec 2013|
|Protection Provided by:||
|Who is Vulnerable?|| nginx HTTP Server 1.5.x prior to 1.5.7 |
nginx HTTP Server 1.x prior 1.4.4
|Vulnerability Description||A security bypass vulnerability has been reported in Nginx.|
|Vulnerability Details||The vulnerability is caused by improper handling of unescaped space characters within URIs.A remote attacker can exploit this vulnerability to bypass security restrictions in certain configurations.|
This protection will detect and block attempts to exploit this vulnerability.No update is required to address this vulnerability.Users are protected against this vulnerability if the Non-HTTP Traffic over HTTP Port protection found in the Protection section of CPAI-2012-118 has been applied.
- In the IPS tab, click Protections and find the Non-HTTP Traffic over HTTP Port protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation
Attack Information: Non-HTTP Traffic over HTTP Port