cve/2017/CVE-2017-7529.md

80 lines
3.6 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-7529](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529)
![](https://img.shields.io/static/v1?label=Product&message=nginx&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190&color=brighgreen)
### Description
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2021/Sep/36
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/AMEENVKD/Nginx1.10.2Checker
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/CalebFIN/EXP-CVE-2017-75
- https://github.com/ConstantaNF/RPM
- https://github.com/DSO-Lab/pocscan
- https://github.com/Dekkert/dz6_soft_distribution
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/Janalytics94/anomaly-detection-software
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/MAD-Goat-Project/mad-goat-docs
- https://github.com/MaxSecurity/CVE-2017-7529-POC
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Moazj8/Nginx-Remote-Integer-Overflow-Vulnerability
- https://github.com/NCNU-OpenSource/Web-Vulnerability
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/RClueX/Hackerone-Reports
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shehzadcyber/CVE-2017-7529
- https://github.com/SirEagIe/CVE-2017-7529
- https://github.com/TesterCC/exp_poc_library
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/WenYang-Lai/CVEs
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/adastraaero/OTUS_LinuxProf
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/coolman6942o/-Exploit-CVE-2017-7529
- https://github.com/cved-sources/cve-2017-7529
- https://github.com/cyberharsh/nginx-CVE-2017-7529
- https://github.com/cyberk1w1/CVE-2017-7529
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/daehee/nginx-overflow
- https://github.com/devansh3008/Cve_Finder_2017-7529
- https://github.com/en0f/CVE-2017-7529_PoC
- https://github.com/fardeen-ahmed/Remote-Integer-Overflow-Vulnerability
- https://github.com/fazalurrahman076/POC
- https://github.com/fu2x2000/CVE-2017-7529-Nginx---Remote-Integer-Overflow-Exploit
- https://github.com/gemboxteam/exploit-nginx-1.10.3
- https://github.com/gunh0/kr-vulhub
- https://github.com/hackerhackrat/R-poc
- https://github.com/imhunterand/hackerone-publicy-disclosed
- https://github.com/kenyokaneda/vulnerable-chat-app
- https://github.com/liusec/CVE-2017-7529
- https://github.com/lnick2023/nicenice
- https://github.com/ltfafei/my_POC
- https://github.com/medeirosvf/-exerc-cio-extra-2017-08-08.md-
- https://github.com/merlinepedra/nginxpwner
- https://github.com/mo3zj/Nginx-Remote-Integer-Overflow-Vulnerability
- https://github.com/nicdelhi/CVE-POC
- https://github.com/nihaohello/N-MiddlewareScan
- https://github.com/ninjabuster/exploit-nginx-1.10.3
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/stark0de/nginxpwner
- https://github.com/tdcoming/Vulnerability-engine
- https://github.com/tinsaye/LID-DS-TF
- https://github.com/woods-sega/woodswiki
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/y1ng1996/w8scan