Nginx
Nginx misconfiguration
Configuration file
GET /nginx.conf
GET /nginx/nginx.confNginx configuration static analyzer
Open Redirect
Path traversal via misconfigured NGINX alias
https://example.com/static../ returns the same response as https://example.com/
Tools
Burp extension
SCRIPT_NAME
Status page
CLRF
Any variable
Raw backend response reading
Send an invalid HTTP request, such as:
We will get the following response:
merge_slashes
The merge_slashes directive is set to “on” by default which is a mechanism to compress two or more forward slashes into one, so /// would become /. If Nginx is used as a reverse-proxy and the application that’s being proxied is vulnerable to local file inclusion, using extra slashes in the request could leave room for exploit it.
Detection


Exploit


Tools
Reverse Proxy - 403 Bypass
Bypass 403 / 401Source: https://www.youtube.com/watch?v=PXqlHAoF2wc
Web Cache Deception
Web CacheResources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated
