Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-2028 PoC — F5 Nginx 缓冲区错误漏洞

Source
Associated Vulnerability
Title:F5 Nginx 缓冲区错误漏洞 (CVE-2013-2028)
Description:F5 Nginx是美国F5公司的一款轻量级Web服务器/反向代理服务器及电子邮件(IMAP/POP3)代理服务器,在BSD-like协议下发行。 F5 Nginx 1.3.9版本至1.4.0版本存在缓冲区错误漏洞。攻击者利用该漏洞导致系统拒绝服务或执行任意代码。
Description
Tool for checking Nginx CVE-2013-2028
Readme
# CVE-2013-2028 - Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow

## Description

The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.

## Example

```
$ python3 nginx_cve_2013_2028_checker.py http://172.17.0.3
[!] Target: http://172.17.0.3 Nginx version: 1.4.0 Vulnerable: True
```

## Exploits

- https://github.com/danghvu/nginx-1.4.0
- https://github.com/m4drat/CVE-2013-2028-Exploit
- https://www.rapid7.com/db/modules/exploit/linux/http/nginx_chunked_size
- http://www.scs.stanford.edu/brop/

## References
 - https://nvd.nist.gov/vuln/detail/CVE-2013-2028
File Snapshot

[4.0K] /data/pocs/225e0950fc70f90e7ed6e501553167eff286c439 ├── [1.4K] nginx_cve_2013_2028_checker.py └── [ 853] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.