[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028)
- To: アドリアンヘンドリック <unixfreaxjp22@xxxxxxxxx>
- Subject: Re: [Full-disclosure] nginx 1.3.9/1.4.0 x86 brute force remote exploit (CVE-2013-2028)
- From: Grandma Eubanks <tborland1@xxxxxxxxx>
- Date: Thu, 11 Jul 2013 09:49:50 -0500
There are already exploits for this vulnerability. This is just taking an
entirely different approach for internally accessible systems then what's
available, for a reason I can't yet discern.
On Thu, Jul 11, 2013 at 9:42 AM, アドリアンヘンドリック <unixfreaxjp22@xxxxxxxxx>wrote:
> I would like to personally thanked KingCope for this PoC. A great work for
> the GREATER good impact.
> Still peeking on the code for tests BUT with very happy feeling,because if
> this works very well (which I know it will be) then (say) 80+% of the
> Malware Exploit Kit servers and Malware proxy servers & infectors which
> mostly are running on NGNIX are ALL affected (hahaha!)
>
> A vulnerability for the good guys, and ZERO f*ckin DAY for those bad guys!
> Seriously. I am saying this out loud in the Full Disclosure maillist for
> all of the good guys to know and bad guys to start to sweat!!
> (not provoking anything) (grins)
>
> ---
> Hendrik ADRIAN / @unixfreaxjp
> #MalwareMUSTDie.org,NPO
>
>
> *king cope* isowarez.isowarez.isowarez at googlemail.com
> <full-disclosure%40lists.grok.org.uk?Subject=Re%3A%20%5BFull-disclosure%5D%20nginx%201.3.9/1.4.0%20x86%20brute%20force%20remote%20exploit%0A%09%28CVE-2013-2028%29&In-Reply-To=%3CCAFB%3DmGALhq9YhFjFZNMG6kzPjU09KUBMVWpa2Q6%2BfXAKNt8dKQ%40mail.gmail.com%3E>
> *Wed Jul 10 17:43:56 BST 2013*
> ------------------------------
>
> (see attachment)
>
> Kingcope
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.html>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: ngxunlock.pl
> Type: application/octet-stream
> Size: 23381 bytes
> Desc: not available
> URL:
> <http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20130710/6d71d416/attachment.obj>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/