漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
In OpenResty through 1.13.6.1, URI parameters are obtained using the ngx.req.get_uri_args and ngx.req.get_post_args functions that ignore parameters beyond the hundredth one, which might allow remote attackers to bypass intended access restrictions or interfere with certain Web Application Firewall (ngx_lua_waf or X-WAF) products. NOTE: the vendor has reported that 100 parameters is an intentional default setting, but is adjustable within the API. The vendor's position is that a security-relevant misuse of the API by a WAF product is a vulnerability in the WAF product, not a vulnerability in OpenResty
漏洞信息
N/A
漏洞
N/A
漏洞
OpenResty 安全漏洞
漏洞信息
OpenResty是一款基于Nginx和Lua的Web平台。该平台用于搭建用于处理高并发、高扩展性的动态Web应用、Web服务和动态网关。 OpenResty 1.13.6.1之前的版本中存在安全漏洞,该漏洞源于程序使用‘ngx.req.get_uri_args’和‘ngx.req.get_post_args’函数接受参数的数量可以超过100个。远程攻击者可利用该漏洞绕过访问限制,干预Web应用程序防火墙(ngx_lua_waf或X-WAF)产品。
漏洞信息
N/A
漏洞
N/A