POC详情: 68710d801f28f5ffb948d56bd9db3f0603be0962

来源
关联漏洞
标题: F5 Nginx 输入验证错误漏洞 (CVE-2017-7529)
描述:F5 Nginx是美国F5公司的一款轻量级Web服务器/反向代理服务器及电子邮件(IMAP/POP3)代理服务器,在BSD-like协议下发行。 F5 Nginx 0.5.6版本至1.13.2版本存在输入验证错误漏洞。攻击者利用该漏洞导致敏感信息泄漏。
描述
Added Vulnerability Code in Python for Nginx Vulnerability (CVE-2017-7529)
介绍
# Nginx : Remote-Integer-Overflow-Vulnerability

<img src="1.png" align="center" />
This Repository consists of an older yet existing Nginx vulnerability named "Remote Integer Overflow Vulnerability (CVE-2017-7529)". The Vulnerability is for Older Nginx servers (>>1.13). (Exception is for Nginx 1.12) 

# Set-up :

- Download sys library and requests library.
- It will be better if you have os library too.

## The Vulnerability that can be exploited to includes :-
```
    1) Reading Sensitive Headers during an Intercept of Requests.
   
    2) Revealing Sensitive Informatino containing real IP Addresses.
```

## This Repo Consists of :-
```
    1) vulnchecker.py : The scripts that checks for R.I.V.O Vulnerability in Nginx servers.
   
    2) exploit.py : The script that will exploit sensitive headers where Nginx server v1.1x (except v1.12) is running.
```

## Steps to use :
```
    1) python3 vulnchecker.py --url <http://example.com/>
    2) python3 exploit.py --url <http://example.com/>  
```
### Please do use the second step only when the first one executes, else your time will be wasted. 
#   Keep hacking for good
文件快照

[4.0K] /data/pocs/68710d801f28f5ffb948d56bd9db3f0603be0962 ├── [5.9K] 1.png ├── [ 514] exploit.py ├── [1.1K] README.md └── [2.1K] vulnchecker.py 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。