| Check Point Reference: | CPAI-2013-3618 |
| Date Published: | 10 Dec 2013 |
| Severity: | High |
| Last Updated: | Sunday 24 May, 2026 |
| Source: | CVE-2013-4547 |
| Protection Provided by: |
Security Gateway |
| Who is Vulnerable? | nginx HTTP Server 1.5.x prior to 1.5.7 nginx HTTP Server 1.x prior 1.4.4 |
| Vulnerability Description | A security bypass vulnerability has been reported in Nginx. |
| Vulnerability Details | The vulnerability is caused by improper handling of unescaped space characters within URIs.A remote attacker can exploit this vulnerability to bypass security restrictions in certain configurations. |
This protection will detect and block attempts to exploit this vulnerability.No update is required to address this vulnerability.Users are protected against this vulnerability if the Non-HTTP Traffic over HTTP Port protection found in the Protection section of CPAI-2012-118 has been applied.
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation
Attack Information: Non-HTTP Traffic over HTTP Port