<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vulnerability Spoiler Alert - nginx/nginx</title>
    <link>https://spaceraccoon.github.io/vulnerability-spoiler-alert</link>
    <description>Vulnerability alerts for nginx/nginx</description>
    <language>en-us</language>
    <lastBuildDate>Fri, 17 Apr 2026 01:52:35 GMT</lastBuildDate>
    <atom:link href="https://spaceraccoon.github.io/vulnerability-spoiler-alert/feed/nginx-nginx.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>[HIGH] Authentication Bypass in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/104</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/104</guid>
      <pubDate>Tue, 24 Mar 2026 15:49:30 GMT</pubDate>
      <description>In the nginx stream SSL module, the OCSP (Online Certificate Status Protocol) certificate revocation check was not being performed during client certificate validation. The code would verify the certificate chain but skip the OCSP status check, allowing clients with revoked certificates to successfully authenticate. The patch adds the missing `ngx_ssl_ocsp_get_status()` call that properly checks and enforces OCSP certificate revocation status.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Integer Overflow leading to Out-of-Bounds Read/Write in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/103</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/103</guid>
      <pubDate>Tue, 24 Mar 2026 14:49:11 GMT</pubDate>
      <description>On 32-bit platforms, multiplying a uint32_t `entries` value by the size of a struct (also size_t/32-bit) could overflow before being compared to the uint64_t `atom_data_size`. This allowed an attacker to craft a malicious MP4 file with a large entries count that, after overflow, appeared to pass the size validation check, causing nginx to process entries beyond the allocated buffer boundaries with out-of-bounds reads and writes. The fix casts `entries` to uint64_t before multiplication to prevent the overflow.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Heap Buffer Overflow in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/102</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/102</guid>
      <pubDate>Tue, 24 Mar 2026 14:48:53 GMT</pubDate>
      <description>When nginx WebDAV module (ngx_http_dav_module) processed COPY or MOVE requests with an alias directive configured, supplying a Destination header with a URI shorter than the alias prefix caused an integer underflow in ngx_http_map_uri_to_path(). The underflow resulted in a heap buffer overwrite, which could allow an attacker to manipulate source or destination file paths to be outside the configured location root (path traversal via memory corruption). The patch adds a validation check that rejects Destination URIs shorter than the alias length before the vulnerable path mapping occurs.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Header Injection / SMTP Injection in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/101</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/101</guid>
      <pubDate>Tue, 24 Mar 2026 14:48:33 GMT</pubDate>
      <description>Before the patch, when nginx&apos;s mail module resolved a client&apos;s IP address to a hostname, it used the resolved hostname without validation in auth_http requests and SMTP proxy communications. An attacker controlling DNS responses could return a hostname containing newlines, spaces, or other special characters, enabling injection of arbitrary headers into auth_http requests or arbitrary SMTP commands into the proxied SMTP session. The patch validates that the resolved hostname only contains RFC 1034-compliant characters (letters, digits, hyphens, dots).</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Null Pointer Dereference in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/100</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/100</guid>
      <pubDate>Tue, 24 Mar 2026 14:48:12 GMT</pubDate>
      <description>When authenticating with CRAM-MD5 or APOP methods, the code set `s-&amp;gt;passwd.data = NULL` but did not reset `s-&amp;gt;passwd.len`. On a subsequent authentication attempt, the non-zero length would cause the code to attempt to use the null pointer as if it pointed to valid password data, resulting in a null pointer dereference and worker process crash. The fix uses `ngx_str_null(&amp;s-&amp;gt;passwd)` which correctly zeroes both the data pointer and the length.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Buffer Overread/Overwrite in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/99</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/99</guid>
      <pubDate>Tue, 24 Mar 2026 14:23:08 GMT</pubDate>
      <description>The nginx mp4 module had off-by-one errors in bounds checking for stco and co64 atoms. When `trak-&amp;gt;start_chunk` equaled `trak-&amp;gt;chunks` (i.e., pointing exactly past the end of the chunks array), the old check `trak-&amp;gt;start_chunk &amp;gt; trak-&amp;gt;chunks` would pass, allowing out-of-bounds memory access. Similarly, empty stsz sample arrays could be processed leading to buffer overread/overwrite. The patch changes `&amp;gt;` to `&amp;gt;=` to properly reject these boundary cases.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Improper Authentication / Cryptographic Token Misbinding (QUIC Stateless Reset token exposure leading to DoS) in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/59</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/59</guid>
      <pubDate>Fri, 27 Feb 2026 15:44:28 GMT</pubDate>
      <description>Before the patch, the QUIC stateless reset token was derived only from a shared secret and the connection ID, making the token identical across workers. In a multi-worker configuration with packet steering, an attacker could intentionally route a victim connection&apos;s packet to a different worker to trigger emission/observation of the stateless reset token, then forge a QUIC Stateless Reset to immediately terminate the victim connection (remote DoS). The patch binds the derived token to the worker number by incorporating ngx_worker into the KDF input, making tokens differ per worker and preventing cross-worker token acquisition/abuse.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] NULL Pointer Dereference (Remote Denial of Service) in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/58</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/58</guid>
      <pubDate>Fri, 27 Feb 2026 15:44:07 GMT</pubDate>
      <description>Before the patch, the QUIC OpenSSL compatibility keylog callback discarded failures from ngx_quic_compat_set_encryption_secret(). Under memory pressure (allocation failure), the encryption context (secret-&amp;gt;ctx) could remain NULL, yet ngx_quic_compat_create_record() would proceed to encrypt and dereference the NULL ctx, crashing the NGINX worker. The patch checks the return value, marks the QUIC connection as errored to fail the handshake cleanly, and adds a NULL guard in record creation to prevent the crash.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] Denial of Service (DoS) / Amplification via Stateless Reset flooding in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/56</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/56</guid>
      <pubDate>Thu, 26 Feb 2026 14:19:34 GMT</pubDate>
      <description>Before the patch, nginx would generate and send a QUIC Stateless Reset for every incoming packet that triggered the stateless reset path, with no per-source rate limiting. An attacker could spoof many UDP packets (often with spoofed source IPs) to force the server to spend CPU on hashing/random generation and to emit many Stateless Reset packets, creating resource exhaustion and reflected traffic. The patch adds a per-second Bloom-filter-based limiter keyed by source address so repeated triggers from the same address are declined.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[HIGH] Buffer Overflow/Out-of-bounds Memory Access in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/46</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/46</guid>
      <pubDate>Mon, 23 Feb 2026 10:32:03 GMT</pubDate>
      <description>The code failed to validate that sync sample values in MP4 stss atoms are 1-based as required by ISO 14496-12. A zero-valued stss entry caused the key_prefix calculation to exceed consumed samples, leading the backward loop in ngx_http_mp4_crop_stts_data() to walk past the beginning of the stts data buffer, causing out-of-bounds memory access.</description>
      <category>high</category>
      <category>unverified</category>
    </item>
    <item>
      <title>[MEDIUM] HTTP Request Smuggling / Content Length Mismatch in nginx/nginx</title>
      <link>https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/27</link>
      <guid isPermaLink="true">https://github.com/spaceraccoon/vulnerability-spoiler-alert/issues/27</guid>
      <pubDate>Tue, 17 Feb 2026 13:53:09 GMT</pubDate>
      <description>The vulnerability allows attackers to cause a mismatch between the Content-Length header sent to SCGI backends and the actual request body size in unbuffered mode. This can lead to HTTP request smuggling or desynchronization between nginx and SCGI backends, potentially allowing request smuggling attacks.</description>
      <category>medium</category>
      <category>unverified</category>
    </item>
  </channel>
</rss>