nginx 0.6.x Arbitrary Code Execution NullByte Injection

测试方法:
提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
    1. # Exploit Title: nginx Arbitrary Code Execution NullByte Injection
    2. # Date: 24/08/2011
    3. # Exploit Author: Neal Poole
    4. # Vendor Homepage: http://nginx.org/
    5. # Software Link: https://launchpad.net/nginx/0.6/0.6.36/+download/nginx-0.6.36.tar.gz
    6. # Version: 0.5.*, 0.6.*, 0.7 <= 0.7.65, 0.8 <= 0.8.37
    7. # Tested on: Ubuntu Server 10.04.1
    8. # nginx version: 0.6.36
    9. # Advisory: https://nealpoole.com/blog/2011/08/possible-arbitrary-code-execution-with-null-bytes-php-and-old-versions-of-nginx/
    10.  
    11.  
    12. # Description
    13. In vulnerable versions of nginx,null bytes are allowed inURIsbydefault(their presence is indicated via a variable named zero_in_uri definedin ngx_http_request.h).Individual modules have the ability to opt-out of handling URIswithnull bytes.However,not all of them do;in particular, the FastCGImodule does not.
    14.  
    15. # Proof of Concept:
    16. http://<server>/<path>/file.ext%00.php
    17. or
    18. http://<server>/<path>/file.ext/x00.php

转载于:https://www.cnblogs.com/security4399/archive/2013/04/20/3032662.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值