Loading HuntDB...

Nginx version is disclosed in HTTP response

None
L
Localize
Submitted None
Reported by hckit_02

Vulnerability Details

Technical details and impact analysis

Uncontrolled Resource Consumption
## Summary: I found a version disclosure (Nginx) in your web server's HTTP response. ***Extracted Version:*** 1.16.1 This information might help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of Nginx. ## Steps To Reproduce: ***Checkout the URL:** https://localizestaging.com/ Checkout the header response: HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 26 Jan 2020 21:37:55 GMT Server: nginx/1.16.1 Vary: Accept-Encoding X-DNS-Prefetch-Control: off X-Content-Type-Options: nosniff X-XSS-Protection: 1; mode=block Content-Security-Policy: object-src 'none'; base-uri https://localizestaging.com; frame-ancestors https://localize.live ETag: W/"883d-dUYoyQDdg3V8h1QICXD3rs4" X-Cache: Miss from cloudfront Via: 1.1 5157dedfe33ef5a309f236599901abe3.cloudfront.net (CloudFront) X-Amz-Cf-Pop: SIN52-C3 X-Amz-Cf-Id: Content-Length: 34877 PoC : F696981: Server Disclosure .jpg ## Supporting Material/References: ***Number of vulnerabilities:*** 3 ***CVE IDs:*** 1. CVE-2019-9511 2. CVE-2019-9513 3. CVE-2019-9516 ##1) Resource exhaustion Severity: Medium CVE-ID: CVE-2019-9511 CWE-ID: CWE-400 - Uncontrolled Resource Consumption ('Resource Exhaustion') ***Description*** The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to improper input validation when processing HTTP/2 requests. A remote attacker can send a specially crafted HTTP/2 request the affected server, consume all available CPU resources and perform a denial of service (DoS) attack. Successful exploitation of the vulnerability requires that support for HTTP/2 is enabled. ***Mitigation*** Install updates from vendor's website. ##2) Resource exhaustion Severity: Medium CVE-ID: CVE-2019-9513 CWE-ID: CWE-400 - Uncontrolled Resource Consumption ('Resource Exhaustion') ***Description*** The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to improper input validation when processing HTTP/2 requests. A remote attacker can send a specially crafted HTTP/2 request the affected server, consume all available CPU resources and perform a denial of service (DoS) attack. Successful exploitation of the vulnerability requires that support for HTTP/2 is enabled. ***Mitigation*** Install updates from vendor's website. ##3) Resource exhaustion Severity: Medium CVE-ID: CVE-2019-9516 CWE-ID: CWE-400 - Uncontrolled Resource Consumption ('Resource Exhaustion') ***Description*** The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to improper input validation when processing HTTP/2 requests within the ngx_http_v2_module module. A remote attacker can send a specially crafted HTTP/2 request the affected server, consume all available CPU resources and perform a denial of service (DoS) attack. Successful exploitation of the vulnerability requires that support for HTTP/2 is enabled. ***Mitigation*** Install updates from vendor's website. ***More details:*** https://www.cybersecurity-help.cz/vdb/SB2019081323 ## Impact An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified. Add the following line to your nginx.conf file to prevent information leakage from the SERVER header of its HTTP response: ```server_tokens off```

Related CVEs

Associated Common Vulnerabilities and Exposures

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data …

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the …

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted

Weakness

Uncontrolled Resource Consumption