Nginx SSI Variable Injection

medium Web App Scanning Plugin ID 113640

Synopsis

Nginx SSI Variable Injection

Description

The scanner has detected in the installed Nginx instance that a user input is being treated as an nginx variable.

This could potentially leak useful information about the server installation to a remote, unauthenticated attacker.

Solution

Developers should avoid evaluating expressions derived directly from untrusted user inputs to prevent malicious injections. If the application still requires this type of inputs, the user-supplied data should be strictly validated to avoid advanced expression injection by using an allowlist or filtering the usage of special characters.

See Also

http://nginx.org/en/docs/http/ngx_http_ssi_module.html

https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/nginx

Plugin Details

Severity: Medium

ID: 113640

Type: remote

Published: 3/8/2023

Updated: 3/8/2023

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

Vulnerability Information

CPE: cpe:2.3:a:nginx:nginx:*:*:*:*:*:*:*:*

Reference Information