Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 95.173.130.2
- www.duma.gov.ru
- SHITTY WEB TECH
- nginx/1.5.7
- WORKING EXPLOITS
- Vulnerable software
- nginx
- Server applications / Web servers
- Vendor NGINX
- Out-of-bounds read
- Description
- The vulnerability allows a remote attacker to gain access to potentially sensitive information.
- The vulnerability exists due to a boundary condition when processing rewrite rules with a '\0' character in ngx_http_core_module.c. An attacker with ability to influence a rewrite rule can view memory contents via Location HTTP header.
- Successful exploitation of vulnerability requires that an attacker can influence rewrite engine, as demonstrated with OpenResty issue.
- Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
- Description
- The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.
- The vulnerability exists with certain error_page configurations. A remote attacker can read unauthorized web pages in environments where NGINX is being fronted by a load balancer.
- Command Injection
- Description
- The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
- The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
- EFFECTED WEBSITES
- api.duma.gov.ru
- iam.duma.gov.ru
- pda.duma.gov.ru
- pda.iam.duma.gov.ru
- pda.transcript.duma.gov.ru
- spec.duma.gov.ru
- transcript.duma.gov.ru
- vote.duma.gov.ru
- www.duma.gov.ru
- #GhostSec
- #EyePhuckBitches
Add Comment
Please, Sign In to add comment