Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-23017 PoC — F5 NGINX Controller 安全漏洞

Source
Associated Vulnerability
Title:F5 NGINX Controller 安全漏洞 (CVE-2021-23017)
Description:A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
Description
NGINX DNS Overflow Vulnerability Check  - CVE-2021-23017 PoC
Readme
# CVE-2021-23017 PoC Scanner
NGINX DNS Overflow Vulnerability Check - CVE-2021-23017 PoC

Este script en Python verifica si un servidor **nginx** es potencialmente vulnerable a la vulnerabilidad crítica **CVE-2021-23017**, que afecta al **resolver DNS** integrado en nginx y puede provocar un desbordamiento de búfer.

## 🔍 ¿Qué hace?

- Solicita al usuario una URL.
- Envía una solicitud HTTP con un encabezado `Host` malicioso (muy largo).
- Si el servidor tiene configurado el `resolver` de nginx y es vulnerable, puede fallar o registrar errores en los logs.
- **No ejecuta código malicioso**, es solo una prueba pasiva de detección.

## 🚀 Cómo usarlo

1. Asegúrate de tener Python 3 instalado.
2. Ejecuta el script:

```bash
python3 CVE-2021-23017.py
File Snapshot

[4.0K] /data/pocs/34e1090c31c8483795828f63aa779d840642585b ├── [1.2K] CVE-2021-23017.py └── [ 771] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →