nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
References
Link | Resource |
---|---|
http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html | Exploit Release Notes Third Party Advisory |
http://www.exploit-db.com/exploits/13818 | Exploit Third Party Advisory VDB Entry |
http://www.exploit-db.com/exploits/13822 | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/40760 | Exploit Third Party Advisory VDB Entry |
http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html | Exploit Release Notes Third Party Advisory |
http://www.exploit-db.com/exploits/13818 | Exploit Third Party Advisory VDB Entry |
http://www.exploit-db.com/exploits/13822 | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/40760 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://spa-s3c.blogspot.com/2010/06/full-responsible-disclosurenginx-engine.html - Exploit, Release Notes, Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/13818 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.exploit-db.com/exploits/13822 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/40760 - Exploit, Third Party Advisory, VDB Entry |
10 Nov 2021, 15:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:* |
Information
Published : 2010-06-15 14:04
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2263
Mitre link : CVE-2010-2263
CVE.ORG link : CVE-2010-2263
JSON object : View
Products Affected
microsoft
- windows
f5
- nginx
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor