Possible Arbitrary Code Execution with Null Bytes (Nginx + PHP)

Joshua Zhu zhuzhaoyuan at gmail.com
Fri Aug 26 03:05:23 UTC 2011

Hi guys,

Just for your information, there is a security hole that may be exploited by
malicious users, when PHP and older versions of nginx (0.5.*, 0.6.*,
0.7 <= 0.7.65, 0.8 <= 0.8.37) being used. And it has been widely spread

This vulnerability was found by Neal Poole and has been reported to Igor:

I do agree with Igor that it's not an issue of Nginx itself, but those lazy
system administrators should upgrade their Nginx to the latest version right



Joshua Zhu
Senior Software Engineer
Server Platforms Team at Taobao
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20110826/823c1387/attachment.html>

More information about the nginx mailing list