4.15.3. Nginx

4.15.3.1. Fast-CGI off

When Fast-CGI is turned off, Nginx still has a parsing vulnerability: add %00.php after the file path (xx.jpg) , then xx.jpg%00.php will be parsed as a php file

4.15.3.2. Fast-CGI enabled

When Fast-CGI is turned on, add /xx.php` after the file path (xx.jpg) , then ``xx.jpg%xx.php will be parsed as a php file

4.15.3.3. CVE-2013-4547

a.jpg\x20\x00.php

4.15.3.4. Misconfiguration

4.15.3.4.1. Directory Traversal

If there is a similar configuration like location /foo { alias /bar/; } in the configuration, it will be parsed /bar/../ as to cause directory traversal to occur

4.15.3.4.2. Directory Traversal

When autoindex on enabled in configuration, there is a directory traversal vulnerability in Nginx.