目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2026-9256— NGINX ngx_http_rewrite_module 漏洞

CVSS 8.1 · High

影响版本矩阵 6

厂商产品版本范围状态
F5NGINX Open Source1.31.0< 1.31.1affected
1.30.0< 1.30.2affected
0.1.17< *affected
F5NGINX Plus37.0< 37.0.1.1affected
R36< R36 P5affected
R32< R32 P7affected
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2026-9256 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
NGINX ngx_http_rewrite_module vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, ^/((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
堆缓冲区溢出
来源: 美国国家漏洞数据库 NVD

受影响产品

厂商产品影响版本CPE订阅
F5NGINX Plus 37.0 ~ 37.0.1.1 -
F5NGINX Open Source 1.31.0 ~ 1.31.1 -

二、漏洞 CVE-2026-9256 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2026-9256 的情报信息

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-9256

暂无评论


发表评论