CVE-2018-9230
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
02/04/2018
Last modified:
05/08/2024
Description
In OpenResty through 1.13.6.1, URI parameters are obtained using the ngx.req.get_uri_args and ngx.req.get_post_args functions that ignore parameters beyond the hundredth one, which might allow remote attackers to bypass intended access restrictions or interfere with certain Web Application Firewall (ngx_lua_waf or X-WAF) products. NOTE: the vendor has reported that 100 parameters is an intentional default setting, but is adjustable within the API. The vendor's position is that a security-relevant misuse of the API by a WAF product is a vulnerability in the WAF product, not a vulnerability in OpenResty
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:* | 1.13.6.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



