Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2021-3618): nginx vulnerability

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2021-3618): nginx vulnerability

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
03/23/2022
Created
04/15/2022
Added
04/13/2022
Modified
04/29/2022

Description

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

Solution(s)

  • ubuntu-upgrade-libnginx-mod-http-lua
  • ubuntu-upgrade-nginx-core
  • ubuntu-upgrade-nginx-extras
  • ubuntu-upgrade-nginx-full
  • ubuntu-upgrade-nginx-light

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;