Vulnerabilities caused by nginx fastcgi misconfiguration + Parsing Vulnerabilities

Source: Internet
Author: User

Now there must be many websites using nginx. Since the nginx Parsing Vulnerability N months ago, it has been fixed almost all the time. The general statements are written in this way.

If ($ fastcgi_script_name ~ \ .. * \/. * Php ){
Return 403;
}

When */*. php * is matched, 403 is returned.

However, some fastcgi configurations do not only support. php, but some even have configured ph * (this is what I wrote online)

In this way, the. php * cannot be matched, and the vulnerability is also caused.

This bug was discovered by a friend of mine Clouds,

The solution is to check the fastcgi configuration file to set the suffix of the file to be deny.

You can also use robots.txt/1.PhP

For example

If ($ fastcgi_script_name ~ \ .. * \/. * Ph *){
Return 403;
}

However, the best method is cgi. fix_pathinfo = 0.

From: network security technology blog (www.safe121.com)
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.