ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.
References
| Link | Resource |
|---|---|
| https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 | Patch Third Party Advisory |
| https://github.com/openresty/lua-nginx-module/pull/1654 | Patch Third Party Advisory |
| https://news.ycombinator.com/item?id=26712562 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20210507-0005/ | Third Party Advisory |
| https://github.com/openresty/lua-nginx-module/compare/v0.10.15...v0.10.16 | Patch Third Party Advisory |
| https://github.com/openresty/lua-nginx-module/pull/1654 | Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/06/msg00026.html | |
| https://news.ycombinator.com/item?id=26712562 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20210507-0005/ | Third Party Advisory |
Configurations
History
03 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2021-04-06 19:15
Updated : 2025-11-03 20:15
NVD link : CVE-2020-36309
Mitre link : CVE-2020-36309
CVE.ORG link : CVE-2020-36309
JSON object : View
Products Affected
openresty
- lua-nginx-module
CWE
