vendor:
nginx
by:
Mert SARICA
7,5
CVSS
HIGH
Denial of Service (DoS)
400
CWE
Product Name: nginx
Affected Version From: 1.3.9
Affected Version To: 1.4.0
Patch Exists: YES
Related CWE: CVE-2013-2028
CPE: nginx:nginx
Metasploit:
https://www.rapid7.com/db/vulnerabilities/nginx-cve-2013-2028/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2013-189/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2013-2070/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-2028/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-2070/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2013-2028/, https://www.rapid7.com/db/vulnerabilities/nginx-cve-2013-2070/, https://www.rapid7.com/db/vulnerabilities/debian-DSA-2721/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali Linux & nginx v1.4.0
2013
nginx v1.3.9-1.4.0 DOS POC (CVE-2013-2028)
This exploit is a proof of concept for a denial of service vulnerability in nginx versions 1.3.9-1.4.0. The vulnerability is caused by a flaw in the way nginx handles chunked transfer encoding requests. By sending a specially crafted request with a large chunk size, an attacker can cause the nginx process to crash.
Mitigation:
Upgrade to the latest version of nginx to mitigate this vulnerability.