First published: Mon Jun 14 2010(Updated: )
nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | >=0.7.52<0.7.66 | |
Nginx | >=0.8.0<=0.8.39 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2263 is ranked as a medium severity vulnerability due to its potential to expose sensitive source code to remote attackers.
To fix CVE-2010-2263, upgrade to nginx versions 0.8.40 or later, or 0.7.66 or later, which include patches to address this vulnerability.
CVE-2010-2263 affects nginx versions prior to 0.8.40 and 0.7.66 when running on Windows platforms.
CVE-2010-2263 exploits a flaw in nginx that allows remote attackers to access source code or unparsed content of files by appending ::$DATA to the URI.
Mitigating CVE-2010-2263 without updating may be challenging; it is recommended to restrict access to the web document root to limit exposure.