Search for vulnerabilities
Vulnerability details: VCID-81pb-4hqw-g3cs
Vulnerability ID VCID-81pb-4hqw-g3cs
Aliases CVE-2019-20372
Summary NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00013.html
http://nginx.org/en/CHANGES
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20372.json
https://api.first.org/data/v1/epss?cve=CVE-2019-20372
https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372
https://duo.com/docs/dng-notes#version-1.5.4-january-2020
http://seclists.org/fulldisclosure/2021/Sep/36
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/kubernetes/ingress-nginx/pull/4859
https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e
https://security.netapp.com/advisory/ntap-20200127-0003/
https://support.apple.com/kb/HT212818
1790277 https://bugzilla.redhat.com/show_bug.cgi?id=1790277
948579 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948579
cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
CVE-2019-20372 https://nvd.nist.gov/vuln/detail/CVE-2019-20372
RHSA-2020:2817 https://access.redhat.com/errata/RHSA-2020:2817
RHSA-2020:5495 https://access.redhat.com/errata/RHSA-2020:5495
RHSA-2021:0778 https://access.redhat.com/errata/RHSA-2021:0778
RHSA-2021:0779 https://access.redhat.com/errata/RHSA-2021:0779
USN-4235-1 https://usn.ubuntu.com/4235-1/
USN-4235-2 https://usn.ubuntu.com/4235-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20372.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-20372
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2019-20372
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.98654
EPSS Score 0.71473
Published At Aug. 11, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:29:50.458763+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.8/main.json 37.0.0