Nginx Plus > R13 Data Disclosure Vulnerability

high Nessus Plugin ID 161695

Synopsis

The remote web server is affected by a data disclosure vulnerability.

Description

According to it's self reported version, the installed version of Nginx Plus is prior to R13 (built on Open Source version 1.13.4). It is, therefore, affected by an integer overflow vulnerability in the range filter module. An unauthenticated, remote attacker can exploit this, via a specially crafted request to disclose potentially sensitive information.

Solution

Upgrade tp Nginx Plus R13 or later.

See Also

https://docs.nginx.com/nginx/releases/

https://nginx.org/en/CHANGES

http://nginx.org/en/security_advisories.html

http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html

Plugin Details

Severity: High

ID: 161695

File Name: nginx_plus_r13.nasl

Version: 1.1

Type: local

Agent: unix

Family: Web Servers

Published: 5/31/2022

Updated: 5/31/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2017-7529

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nginx:nginx

Required KB Items: installed_sw/Nginx Plus

Exploit Ease: No known exploits are available

Patch Publication Date: 7/22/2017

Vulnerability Publication Date: 7/11/2017

Reference Information

CVE: CVE-2017-7529

BID: 103938