Nginx

Nginx misconfiguration

ko-fiarrow-up-right

Configuration file

GET /nginx.conf
GET /nginx/nginx.conf

Nginx configuration static analyzer

Open Redirect

Path traversal via misconfigured NGINX alias

https://example.com/static../ returns the same response as https://example.com/

Tools

Burp extension

SCRIPT_NAME

Status page

CLRF

Any variable

Raw backend response reading

Send an invalid HTTP request, such as:

We will get the following response:

merge_slashes

The merge_slashesarrow-up-right directive is set to “on” by default which is a mechanism to compress two or more forward slashes into one, so /// would become /. If Nginx is used as a reverse-proxy and the application that’s being proxied is vulnerable to local file inclusion, using extra slashes in the request could leave room for exploit it.

  1. Detection

  1. Exploit

Tools

Reverse Proxy - 403 Bypass

Bypass 403 / 401chevron-right

Source: https://www.youtube.com/watch?v=PXqlHAoF2wcarrow-up-right

Web Cache Deception

Web Cachechevron-right

Resources

Interesting Books

Interesting Bookschevron-right
circle-info

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fiarrow-up-right

buymeacoffeearrow-up-right

Last updated