全球主机交流论坛

标题: Nginx %00空字节执行任意代码(php)漏洞 [打印本页]

作者: 攻城狮    时间: 2011-8-26 21:11
标题: Nginx %00空字节执行任意代码(php)漏洞
影响版本:
nginx 0.5.*
nginx 0.6.*
nginx 0.7 <= 0.7.65
nginx 0.8 <= 0.8.37

漏洞描述:
Possible Arbitrary Code Execution with Null Bytes, PHP, and Old Versions of nginx

Ngnix在遇到%00空字节时与后端FastCGI处理不一致,导致可以在图片中嵌入PHP代码然后通过访问xxx.jpg%00.php来执行其中的代码

In vulnerable versions of nginx, null bytes are allowed in URIs by default (their presence is indicated via a variable named zero_in_uri defined in ngx_http_request.h).

Individual modules have the ability to opt-out of handling URIs with null bytes. However, not all of them do; in particular, the FastCGI module does not.
<*参考
https://nealpoole.com/blog/2011/ ... -versions-of-nginx/
*>

测试方法:
[sebug.net]
本站提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
The attack itself is simple: a malicious user who makes a request to http://example.com/file.ext%00.php causes file.ext to be parsed as PHP.

If an attacker can control the contents of a file served up by nginx (ie: using an avatar upload form) the result is arbitrary code execution. This vulnerability can not be mitigated by nginx configuration settings like try_files or PHP configuration settings like cgi.fix_pathinfo: the only defense is to upgrade to a newer version of nginx or to explicitly block potentially malicious requests to directories containing user-controlled content.

SEBUG安全建议:

解决方案
升级nginx版本
http://nginx.org
作者: nbclare    时间: 2011-8-26 21:12

作者: 哈哈大侠    时间: 2011-8-26 21:14
这个字节?这个不是win系统下的漏洞么
作者: 金关村村长    时间: 2011-8-26 21:15
不是發過 了嗎?
作者: lemss    时间: 2011-8-26 21:18
之前就有了
作者: czc111222    时间: 2011-8-26 21:34
关注
作者: dotswing    时间: 2011-8-26 21:35
最新版路过
作者: 小夜    时间: 2011-8-26 21:42
我今天部署了几个,升到1.1.1了,LNMP有一键脚本,还是很方便的。
作者: guoli98    时间: 2011-8-26 21:44
提示: 作者被禁止或删除 内容自动屏蔽
作者: 咖啡    时间: 2011-8-26 21:47
新版路过。。。
作者: 我是人    时间: 2011-8-26 21:49
又出现一次。。。
http://www.lilynana.eu.org/viewthread.php?tid=73183
作者: 剑书    时间: 2011-8-26 21:51
0.8.55路过




欢迎光临 全球主机交流论坛 (https://lilynana.eu.org/) Powered by Discuz! X3.4