<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hetsaraiya</title><link>https://news.ycombinator.com/user?id=hetsaraiya</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 15 May 2026 15:15:05 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hetsaraiya" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hetsaraiya in "New Nginx Exploit"]]></title><description><![CDATA[
<p>Just saw this pop up — full public PoC for CVE-2026-42945 ("NGINX Rift"), a heap buffer overflow in NGINX's ngx_http_rewrite_module that's been there since 0.6.27 (2008).<p>It triggers on a very common pattern: a `rewrite` directive (with an unnamed capture like $1/$2 and a `?` in the replacement string) followed by `set`, `if`, or another `rewrite`. The root cause is a classic two-pass script engine bug (length calculation vs. actual copy pass with ngx_escape_uri).<p>The PoC turns it into unauthenticated RCE using cross-request heap feng shui + pool cleanup pointer corruption. Tested with a simple Docker setup.<p>- Repo + Python exploit: <a href="https://github.com/DepthFirstDisclosures/Nginx-Rift" rel="nofollow">https://github.com/DepthFirstDisclosures/Nginx-Rift</a>
- Full technical write-up: <a href="https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability" rel="nofollow">https://depthfirst.com/research/nginx-rift-achieving-nginx-r...</a>
- F5 advisory + patches (1.31.0 / 1.30.1 for OSS, plus Plus updates): <a href="https://my.f5.com/manage/s/article/K000160932" rel="nofollow">https://my.f5.com/manage/s/article/K000160932</a> (or the latest K000161019)<p>Affects basically any NGINX doing URL rewriting in front of apps/PHP/etc. Workaround mentioned is switching to named captures.<p>The discovery angle is also interesting — it was found autonomously by depthfirst's security analysis tool after one-click onboarding of the NGINX source.<p>Anyone running NGINX in production using rewrite rules? How are you checking your configs? Thoughts on the exploit chain or the AI-assisted finding process?</p>
]]></description><pubDate>Thu, 14 May 2026 17:17:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=48138269</link><dc:creator>hetsaraiya</dc:creator><comments>https://news.ycombinator.com/item?id=48138269</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48138269</guid></item><item><title><![CDATA[New Nginx Exploit]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/DepthFirstDisclosures/Nginx-Rift">https://github.com/DepthFirstDisclosures/Nginx-Rift</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=48138268">https://news.ycombinator.com/item?id=48138268</a></p>
<p>Points: 408</p>
<p># Comments: 96</p>
]]></description><pubDate>Thu, 14 May 2026 17:17:48 +0000</pubDate><link>https://github.com/DepthFirstDisclosures/Nginx-Rift</link><dc:creator>hetsaraiya</dc:creator><comments>https://news.ycombinator.com/item?id=48138268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48138268</guid></item></channel></rss>