ThreatMon Blog
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
No Result
View All Result
ThreatMon Blog
No Result
View All Result

Home » What are Multiple Nginx Vulnerabilities?

What are Multiple Nginx Vulnerabilities?

ibrahim mestav by ibrahim mestav
September 12, 2023
in General
0
what-are-multiple-nginx-vulnerabilities-01
597
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

In this article, Nginx Server and its vulnerabilities, and ways to mitigate these threats will be talked about.

How to find the website’s server?

There are multiple tools available to find out which web server is used.

The first of these is curl -I command. curl -I command is run on terminal in order to learn web server.

find-the-websites-server-1

Second, It can be found by viewing the header in the browser.

These steps should be followed:

  • Right-click on the page
  • Click inspect

find-the-websites-server-02 (1)

  • Or use these commands to open the header: Mac: option+command i, Windows: ctrl+ shift i
  • Click the Network tab in the header.
  • Then refresh the page to view all uploaded files.
  • Click on any of the lines containing the name and file.

find-the-websites-server-03

Here is the web server and version used on the website.

So what does this information do?

A threat actor that learns web server and version info used on the website can use this information for malicious purposes.

Web servers can contain exploitable bugs like any software. These can also be major flaws that could cause an attacker to remotely execute code in the system. RCE flaw 9.4, tracked with code CVE-2021-23017, is rated critical.

An attacker who exploits this vulnerability can escalate their privileges, causing more critical problems.

In addition, they can create buffer overflows to take control of the Web server and attack the system to replace Web pages or take them down.

For example, the vulnerability tracked by code CVE-2017-20005 (CVSS: 9.8) is a critical buffer overflow issue.

Mitigation and Remediation

It is mentioned above are just a few of the ways web servers can be exploited. There are important actions to be taken to mitigate these threats.

  1. It is important to upgrade web servers to their current versions in order to mitigate these threats.
  2. Second, the web server name can be changed or removed from the header in the browser. If an attacker can’t find the web server name and its version, there will be no such vulnerabilities.

These actions are important to protect the assets in the cyber world against a possible attack.

References:

https://www.digitalocean.com/community/tutorials/how-to-customize-your-nginx-server-name-after-compiling-from-source-in-centos

https://www.tecmint.com/change-apache-server-name-to-anything-in-server-headers/

https://blog.avast.com/create-a-secure-web-server-avast

https://nvd.nist.gov/vuln/detail/CVE-2021-23017

https://nvd.nist.gov/vuln/detail/CVE-2017-20005

Next Post

What are Multiple Microsoft IIS Vulnerabilities?

Next Post
what-are-multiple-microsoft-iis-vulnerabilities-1

What are Multiple Microsoft IIS Vulnerabilities?

Recommended

google-has-released-an-update-for-the-new-chrome-zero-day-vulnerability

Google Has Released an Update for the New Chrome Zero-Day Vulnerability

August 5, 2023
what-are-multiple-nginx-vulnerabilities-01

What are Multiple Nginx Vulnerabilities?

September 12, 2023

Popular Story

  • chatgpt-and-malware-analysis-threatmon

    ChatGPT and Malware Analysis – ThreatMon

    977 shares
    Share 391 Tweet 244
  • ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

    777 shares
    Share 311 Tweet 194
  • TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

    751 shares
    Share 300 Tweet 188
  • What is SMTP Open Mail Relay Vulnerability?

    728 shares
    Share 291 Tweet 182
  • The Importance of Attack Surface Management for Organizations

    678 shares
    Share 271 Tweet 170

Intelligence Modules

Cyber Threat Intelligence Attack Surface Management Digital Risk Protection

Resources

Blog Reports

Platform

Discover the platform

Company

About Us Terms & Use Privacy Policy

Blog

The Importance of Attack Surface Management for Organizations ChatGPT and Malware Analysis – ThreatMon TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
threatmon-logo

Copyright © 2023

No Result
View All Result
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Advanced Threat Intelligence Platform
Get 30 Days Free Trial
Get 30 Days Free Trial