Description
Allowing null byte character (ASCII 0x00) in the URL can lead to a severe security risk. If the user can manipulate file contents on the server, this vulnerability may result in arbitrary PHP code execution, enabling attackers to take control of the server and execute unauthorized commands.
Recommendation
Upgrade Nginx to a version that properly sanitizes input and disallows null byte characters in URLs.
References
Related Issues
- Nginx Code Execution due to Misconfiguration - Vulnerability
- Nginx Integer Overflow - CVE-2017-7529
- Nginx Restriction Bypass via Space Character in URI - CVE-2013-4547
- Nginx Version Disclosure - Vulnerability
- Tags:
- Nginx
- Arbitrary Code Execution
- Input Validation
Anything's wrong? Let us know Last updated on May 13, 2024