exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/25775
This Metasploit module exploits a stack buffer overflow in nginx versions 1.3.9 to 1.4.0 via a malformed chunked encoding request. It bypasses stack canary protection through brute-forcing and achieves remote code execution on vulnerable systems.
Classification
Working Poc 100%
Target:
nginx 1.3.9-1.4.0
No auth needed
Prerequisites:
Network access to vulnerable nginx server · Target system must be running a vulnerable version of nginx
exploitdb
WORKING POC
by sorbo · textremotelinux_x86-64
https://www.exploit-db.com/exploits/32277
This exploit leverages the BROP (Blind Return-Oriented Programming) technique to achieve remote code execution on 64-bit nginx versions <= 1.4.0. It includes scripts for scanning, fragmentation, and exploitation, making it adaptable to various distributions and source-compiled installations.
Classification
Working Poc 90%
Target:
nginx <= 1.4.0
No auth needed
Prerequisites:
64-bit nginx installation · network access to the target · ability to send crafted packets
exploitdb
WORKING POC
by kingcope · perlremotelinux_x86
https://www.exploit-db.com/exploits/26737
This exploit targets a vulnerability in nginx 1.3.9/1.4.0 (CVE-2013-2028) to achieve remote code execution by leveraging a brute-force method to bypass stack protections and execute a reverse shell. It requires specific network conditions (e.g., high MTU) and is designed for x86 Linux systems.
Classification
Working Poc 95%
Target:
nginx 1.3.9/1.4.0
No auth needed
Prerequisites:
Network access to vulnerable nginx server · High MTU setting on attacker's machine · x86 Linux target
exploitdb
WORKING POC
by Mert SARICA · pythondoslinux
https://www.exploit-db.com/exploits/25499
This exploit targets a denial-of-service (DoS) vulnerability in nginx versions 1.3.9 to 1.4.0 by sending malformed chunked HTTP requests. The PoC sends a series of chunked requests with an invalid chunk size to trigger a crash or hang in the nginx server.
Classification
Working Poc 95%
Target:
nginx 1.3.9-1.4.0
No auth needed
Prerequisites:
Network access to the target nginx server
nomisec
WORKING POC
55 stars
by kitctf · poc
https://github.com/kitctf/nginxpwn
This repository contains the nginx 1.4.0 source code and precompiled binaries for exploiting CVE-2013-2028, a stack-based buffer overflow vulnerability. It includes a Vagrantfile for easy setup and debugging instructions.
Classification
Working Poc 95%
Target:
nginx 1.4.0
No auth needed
Prerequisites:
nginx 1.4.0 installed · ability to send crafted HTTP requests
nomisec
WORKING POC
30 stars
by danghvu · poc
https://github.com/danghvu/nginx-1.4.0
This repository contains a working exploit PoC for CVE-2013-2028, a buffer overflow vulnerability in nginx 1.4.0. The exploit uses a ROP chain and shellcode to achieve remote code execution via a crafted HTTP request with chunked encoding.
Classification
Working Poc 95%
Target:
nginx 1.4.0
No auth needed
Prerequisites:
Target running nginx 1.4.0 · Network access to the target
nomisec
WORKING POC
20 stars
by m4drat · poc
https://github.com/m4drat/CVE-2013-2028-Exploit
This exploit targets an integer overflow in Nginx's chunked encoding parser (CVE-2013-2028) to achieve remote code execution via a reverse shell. It bruteforces the stack canary, leverages ROP to call mprotect, and executes shellcode.
Classification
Working Poc 95%
Target:
Nginx 1.3.9 to 1.4.0
No auth needed
Prerequisites:
Network access to vulnerable Nginx instance · Python 2.x environment · pwntools library
nomisec
WORKING POC
3 stars
by tachibana51 · poc
https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC
This is a Python-based exploit PoC for CVE-2013-2028, targeting a vulnerability in nginx to bypass NX, PIE, SSP, and ASLR protections. It uses a reverse shell payload and leverages memory corruption techniques to achieve remote code execution.
Classification
Working Poc 95%
Target:
nginx (version not explicitly specified)
No auth needed
Prerequisites:
Network access to the target · Vulnerable nginx version · Knowledge of target's libc version
nomisec
WORKING POC
1 stars
by jptr218 · poc
https://github.com/jptr218/nginxhack
This is a functional exploit for CVE-2013-2028 targeting Nginx 1.3.9/1.4.0, which leverages a stack-based buffer overflow via chunked encoding to inject and execute a bind shell payload. The exploit includes canary brute-forcing and shellcode injection for remote code execution.
Classification
Working Poc 95%
Target:
Nginx 1.3.9, 1.4.0
No auth needed
Prerequisites:
Target running vulnerable Nginx version · Network access to the target · Linux-based target system
nomisec
SCANNER
by xiw1ll · poc
https://github.com/xiw1ll/CVE-2013-2028_Checker
This repository contains a Python script that checks if a target Nginx server is vulnerable to CVE-2013-2028 by parsing the version from the Server header. It does not exploit the vulnerability but verifies if the version falls within the affected range (1.3.9 to 1.4.0).
Classification
Scanner 100%
Target:
Nginx 1.3.9-1.4.0
No auth needed
Prerequisites:
Network access to the target server · Nginx server with exposed Server header
nomisec
WORKING POC
by Sunqiz · poc
https://github.com/Sunqiz/CVE-2013-2028-reproduction
This repository contains a working exploit for CVE-2013-2028, targeting a stack-based buffer overflow in nginx 1.4.0. The exploit uses ROP chains to bypass DEP and execute a reverse shell payload.
Classification
Working Poc 95%
Target:
nginx 1.4.0
No auth needed
Prerequisites:
Network access to vulnerable nginx server · Ability to brute-force canary value
metasploit
WORKING POC
GREAT
by Greg MacManus, hal, saelo · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/nginx_chunked_size.rb
This Metasploit module exploits a stack buffer overflow in nginx versions 1.3.9 to 1.4.0 via a crafted chunked encoding request, leveraging an integer overflow to achieve remote code execution.
Classification
Working Poc 95%
Target:
nginx 1.3.9-1.4.0
No auth needed
Prerequisites:
Network access to the target nginx server · Chunked encoding enabled on the server