Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Version Disclosure (nginx) #15

Closed
dr-cdqh opened this issue Apr 11, 2017 · 9 comments
Closed

Version Disclosure (nginx) #15

dr-cdqh opened this issue Apr 11, 2017 · 9 comments

Comments

@dr-cdqh
Copy link

dr-cdqh commented Apr 11, 2017

Hello team,
I've detected a version disclosure (Nginx) in the target web server's HTTP response. This information might help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of Nginx.

URL: https://manalyzer.org/
HTTP Response:
HTTP/1.1 200 OK
Server: nginx/1.2.1
Connection: keep-alive
Content-Encoding:
Strict-Transport-Security: max-age=15768000
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Date: Tue, 11 Apr 2017 00:02:26 GMT

identified version: 1.2.1

and you are using an out-of-date version of Nginx. Since this is an old version of the software, it may be vulnerable to attacks.

@dr-cdqh
Copy link
Author

dr-cdqh commented Apr 11, 2017

I found a 403 forbidden page which is diclosing nginx version too.
URL: https://manalyzer.org/static/

@dr-cdqh
Copy link
Author

dr-cdqh commented Apr 11, 2017

These are the known vulnerabilites of this version:
1.ginx Restriction Bypass Vulnerability

nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain $index_allocation sequences in a request.

External References
CVE-2011-4963

2.nginx Restriction Bypass Vulnerability

nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.

External References
CVE-2013-4547

3.nginx Request Line Parsing Vulnerability

nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.

External References
CVE-2013-4547

4.Nginx Plaintext Command Injection Attack

The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a 'plaintext command injection' attack, a similar issue to CVE-2011-0411.

External References
CVE-2014-3556

5.Nginx SSL Virtual Host Confusion Attacks

nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct 'virtual host confusion' attacks.

External References
CVE-2014-3616

@JusticeRage
Copy link
Owner

Thanks for reporting this. Have you tried exploiting these vulnerabilities? All relevant patches have most likely been backported by Debian's security team.
I might just disable server tokens anyway, because I'm getting too many reports based just on the version number.

@dr-cdqh
Copy link
Author

dr-cdqh commented Apr 11, 2017 via email

@JusticeRage
Copy link
Owner

JusticeRage commented Apr 11, 2017

As mentioned in the bug bounty rule page, exploitability needs to be demonstrated. A simple application version is not sufficient to indicate a vulnerability as security patches may be backported by distribution maitainers.

Is my report is eligible for bounty or swag.

Please accept this free Manalyzer logo as thanks for banner grabbing my server:
Manalyzer logo

@dr-cdqh
Copy link
Author

dr-cdqh commented Apr 11, 2017 via email

@JusticeRage
Copy link
Owner

To quote the bug bounty rules again :
Security issues in the manalyzer.org machine are eligible as well. However, only bugs which have an actual security impact will be rewarded with money. (Emphasis also in the original document)

Information disclosures are eligible for bounty or swag if and only if the rules say they do, and they specifically indicate otherwise.

@dr-cdqh
Copy link
Author

dr-cdqh commented Apr 11, 2017 via email

@JusticeRage
Copy link
Owner

You just got swag (a free copy of the manalyzer logo).
I also think actual security impact should be rewarded with money. Sadly, you report is neither impactful, security-related or even actual (a CVE from 2011).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants