<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>nginx | OKHK 👀</title><description>个人数字泔水\(⁠◔⁠‿⁠◔⁠)✨ Thinking...</description><link>https://okhk.pages.dev</link><item><title>🔴 NGINX </title><link>https://okhk.pages.dev/posts/9828</link><guid isPermaLink="true">https://okhk.pages.dev/posts/9828</guid><pubDate>Thu, 14 May 2026 03:18:30 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;NGINX&lt;/mark&gt; http_rewrite 模块漏洞；或会导致堆溢出甚至远程代码执行。&lt;br /&gt;&lt;br /&gt;- 漏洞的起因是 &lt;mark&gt;nginx&lt;/mark&gt; 尝试将 escape 过的 URL 写入未 escape 长度的内存。&lt;br /&gt;- 在 ASLR 未被开启的情况下，可以导致远程代码执行。&lt;br /&gt;- 修复已于 1.30.1/1.31.0 发布。&lt;br /&gt;&lt;br /&gt;1. &lt;a href=&quot;https://depthfirst.com/nginx-rift&quot; target=&quot;_blank&quot;&gt;https://depthfirst.com/nginx-rift&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;https://my.f5.com/manage/s/article/K000161019&quot; target=&quot;_blank&quot;&gt;my.f5.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;CVE: CVE-2026-42945&lt;br /&gt;CVSS: 9.2 (F5 Networks)&lt;br /&gt;Affect: [0.6.27, 1.30.0]&lt;br /&gt;Fixed-At: 1.30.1, 1.31.0&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/result?q=%23nginx&quot;&gt;#nginx&lt;/a&gt;&lt;a href=&quot;https://depthfirst.com/nginx-rift&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Depthfirst&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;NGINX Rift&quot; src=&quot;/static/https://cdn4.telesco.pe/file/ZFlK8JJclD5YLjGhWdrrj2c1hz6yWIap0pKMONzbmudy2g2YLGxraQZAmSEe-a-DeC_N_w43f16zpOX0fifZU015jthtcWYTXDAUFvtsNemq7-s-51gzVY6g5JQEj_pg5m45qQIKMofqOMO-HlC82YNLjWlJcWQfb4wz9L6mmuHOmyXpf9Rqdj2HJ36fx5pBdno2bGyjsCpi7d9Z_hZi_VCs7VJbkeHq7yRAvDX6l9GdXO07qM50pVd6sKA_VVD4HKdGZK-SenP5OlGDtbJ9hJaG54jpM4f3nB04vrb9GJaH8kC1_64SGrF5iEN7lEfaUKQB-lLjHOliijR8natm8A.jpg&quot; width=&quot;1200&quot; height=&quot;630&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;&lt;mark&gt;NGINX&lt;/mark&gt; Rift&lt;/div&gt;
  &lt;div&gt;An 18 year old memory corruption flaw in &lt;mark&gt;NGINX&lt;/mark&gt; Plus and &lt;mark&gt;NGINX&lt;/mark&gt; Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>