关联漏洞
标题:
F5 Nginx 输入验证错误漏洞
(CVE-2017-7529)
描述:F5 Nginx是美国F5公司的一款轻量级Web服务器/反向代理服务器及电子邮件(IMAP/POP3)代理服务器,在BSD-like协议下发行。 F5 Nginx 0.5.6版本至1.13.2版本存在输入验证错误漏洞。攻击者利用该漏洞导致敏感信息泄漏。
描述
Added Vulnerability Code in Python for Nginx Vulnerability (CVE-2017-7529)
介绍
# Nginx : Remote-Integer-Overflow-Vulnerability
<img src="1.png" align="center" />
This Repository consists of an older yet existing Nginx vulnerability named "Remote Integer Overflow Vulnerability (CVE-2017-7529)". The Vulnerability is for Older Nginx servers (>>1.13). (Exception is for Nginx 1.12)
# Set-up :
- Download sys library and requests library.
- It will be better if you have os library too.
## The Vulnerability that can be exploited to includes :-
```
1) Reading Sensitive Headers during an Intercept of Requests.
2) Revealing Sensitive Informatino containing real IP Addresses.
```
## This Repo Consists of :-
```
1) vulnchecker.py : The scripts that checks for R.I.V.O Vulnerability in Nginx servers.
2) exploit.py : The script that will exploit sensitive headers where Nginx server v1.1x (except v1.12) is running.
```
## Steps to use :
```
1) python3 vulnchecker.py --url <http://example.com/>
2) python3 exploit.py --url <http://example.com/>
```
### Please do use the second step only when the first one executes, else your time will be wasted.
# Keep hacking for good
文件快照
[4.0K] /data/pocs/68710d801f28f5ffb948d56bd9db3f0603be0962
├── [5.9K] 1.png
├── [ 514] exploit.py
├── [1.1K] README.md
└── [2.1K] vulnchecker.py
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。