Principles and usage of Nginx Parsing Vulnerabilities

Source: Internet
Author: User

The Nginx parsing vulnerability is already an old one, but many nginx versions with the parsing vulnerability exist on the Internet.

I haven't written any articles for a long time. I went to sleep and went to the French client to see a penetration article on the nginx vulnerability. I found that I didn't seem to have written it.

And so on ~~~

The nginx parsing vulnerability is caused by a vulnerability in some nginx version programs, which leads to non-executable parsing script programs such as PHP.

Assume that there is an image url on the website with the vulnerability as follows:

Www.2cto.com/logo.jpg // assume this image exists.

When we access it normally, nginx will directly read this file as a non-scripting language and send it to the client (that is, the browser),

Nginx with the parsing vulnerability will parse and execute the following connection ~ :

Www.2cto.com/logo.jpg/a. php // (the old example uses this syntax. nginxwill parse logo.jpg as a script and then output it .)

Www.2cto.com/logo.jpg % 00.php // This Is A parsing vulnerability that emerged in middle July.

What are the dangers of such resolution vulnerabilities? In fact, many websites have strict security or program examples, but many social media

Or interactive websites often allow users to upload images. For example, social websites generally allow users to upload portraits ~ In this way, if someone is interested in sending a Trojan

You can parse it directly. Now, let's take an example to describe:

A dating site:

 

When you see so many images ~~~ There must be a place to upload. Register an account first. After registration, you are prompted to upload the photo.

Upload a prepared tuema. You need to review the image ~~

 

Right-click the image review element (chrome browser is used ):

 

We can see the image connection, but don't be happy ~~ I see middle.jpg. If you are a programmer, you should know

In order to reduce the server pressure, image resources will also be processed and only thumbnails will be displayed in some areas. Therefore, thumbnails are processed.

Tuma does not work. So you must find the source image. In fact, the real address of the source image is to remove. middle. Why? Because the source image will certainly

Saved because my picture is under review (of course, my avatar cannot pass the Review). If the review is approved, click to view the large image.

Generally, this big image is your source image (theoretically ).

Let's take a look at the connection address:

Http://www.2cto.com/upload/picture/photo/006/65/26/503/d136ee3aaf.jpg/. php

For example, the image has been successfully parsed as an executable script:

 

I browsed it a little and the permission was loose ~~~

Well, I still hope that the major Webmasters can pay attention to security ~

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.