-
Notifications
You must be signed in to change notification settings - Fork 440
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Exploit] CVE-2017-7529 / Nginx - Remote Integer Overflow Vulnerability #15
Comments
Hi, could you tell me ho to use exploit. Thenks! |
Copy the code and paste it in notepad of windows or whatever the OS you're using and run it using the following command ex: python3 test.py http://www."URL".com |
Hmm, just tried the following:
According to Dockerfile and to the proxy replies the nginx-version is 1.11.10, so the bug should apply, right? |
Thanks @siochs . I will try to review it. |
is there solution for this? is it a high risk issue? |
I found a article about this issue and looks like there is a patch for this issue. https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7529.html the following configuration can |
Still curious why the Exploit does not work using a vulnerable nginx-proxy runnning in a docker container. |
You may want to submit your exploit @ https://www.exploit-db.com/submit/ |
@siochs Change this; |
This still does not seem to work and I get the same error as @siochs . Any further suggestions ? |
It didnt work for me aswell |
didnt work for me as well.. |
what version of python are you all using? sometimes if the version isn't correct python gives out errors. |
I get the same error as @siochs.any idea how to resolve it |
INFO:main:[?] Unknown Vulnerable |
same error here too |
same error here too: |
same error here too:
any idea ? |
Not vulnerable: 1.13.3+, 1.12.1+ |
Change "Content-Range" in httpResponse.text to "Content-Range" in httpResponse.headers |
I got |
the same error . |
hey i find nginx/1.13.9 cve??? |
in line |
I am looking for nginx1.14.1 cve.
Is there ??
|
After that change, I'm still getting: INFO:main:status: 200: Server: nginx/1.10.3 any idea? |
Hello, I got here while searching for an exploit from a HTB system. To everyone getting the "Unknown Vulnerable" error - update the code like so, starting at line 32:
This way, you can actually see the HTTP response code from the target server. If it's not "206" as the logic shows in the exploit test code, This is probably the case if Ngnix is installed from distribution's package repositories. I hope that this helps. |
Hello, We've updated our Nginx to new version 1.15.9 but still getting Vulnerable to CVE-2017-7529 message. Why is it still showing that message instead of Unknown Vulnerable after we updated to latest version. Can anyone give any inputs? Thanks! INFO:main:status: 200: Server: |
it appears that nginx/1.12.1 isn't vunerable, but it is on the range 0.5.6 - 1.13.2. can someone verify this please?? |
This python script does work. The url need to be something like http://xxx/yyy/zzz.png, also, you should modify nginx.conf to make the url could be accessed.
NOT
We need a image file to do this. I compiled nginx 1.14.0 without this patch.
|
I fixed up this exploit and made it into a nice little gist: https://gist.github.com/thehappydinoa/bc3278aea845b4f578362e9363c51115 |
anyone can tell me what is the mean of this responce |
The gist ignores snorez advice to look for Content-Range in the response text as opposed to the header. |
@snorez Will HTTPS not work for reproducing this exploit? |
Hmm? Interesting .... exploit is not working with vulnerable server |
Description
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
References
The text was updated successfully, but these errors were encountered: