frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

New Nginx Exploit

https://github.com/DepthFirstDisclosures/Nginx-Rift
104•hetsaraiya•1h ago

Comments

hetsaraiya•1h ago
Just saw this pop up — full public PoC for CVE-2026-42945 ("NGINX Rift"), a heap buffer overflow in NGINX's ngx_http_rewrite_module that's been there since 0.6.27 (2008).

It triggers on a very common pattern: a `rewrite` directive (with an unnamed capture like $1/$2 and a `?` in the replacement string) followed by `set`, `if`, or another `rewrite`. The root cause is a classic two-pass script engine bug (length calculation vs. actual copy pass with ngx_escape_uri).

The PoC turns it into unauthenticated RCE using cross-request heap feng shui + pool cleanup pointer corruption. Tested with a simple Docker setup.

- Repo + Python exploit: https://github.com/DepthFirstDisclosures/Nginx-Rift - Full technical write-up: https://depthfirst.com/research/nginx-rift-achieving-nginx-r... - F5 advisory + patches (1.31.0 / 1.30.1 for OSS, plus Plus updates): https://my.f5.com/manage/s/article/K000160932 (or the latest K000161019)

Affects basically any NGINX doing URL rewriting in front of apps/PHP/etc. Workaround mentioned is switching to named captures.

The discovery angle is also interesting — it was found autonomously by depthfirst's security analysis tool after one-click onboarding of the NGINX source.

Anyone running NGINX in production using rewrite rules? How are you checking your configs? Thoughts on the exploit chain or the AI-assisted finding process?

stephenlf•1h ago
Crap
hmokiguess•1h ago
I read that in my own voice, so relatable hahahaha
Twirrim•1h ago
Given it relies on ASLR being disabled, it's extremely unlikely you're at any risk from this.
Tepix•14m ago
That‘s wishful thinking
jmaw•1h ago
Wow, coming from the webdev world. It is so funny seeing NGINX, one of the widest used web servers in the world, on version 1.x. React is on version 19. Really shows how differently new vs. old software is designed and built, and not necessarily in a good way.

https://world.hey.com/dhh/finished-software-8ee43637 https://josem.co/the-beauty-of-finished-software/

joecool1029•1h ago
lighttpd still around too, on 1.4.82, not too much changed there.
ranger_danger•1h ago
They've been working on version 2.0 for many years now as well, I wonder when they think a release might happen.
ranger_danger•1h ago
I chalk that up more to different versioning schemes rather than how much work is being done. If nginx changed whole numbers like react did, I bet it would be even higher.
syoc•1h ago
I guess someone need to update https://0ver.org/ then.
shooly•1h ago
> not necessarily in a good way

How do you think versioning works? You know that it's completely arbitrary and up to the author, right? Very ironic comment.

0x457•1h ago
That's because nginx doesn't break things for end user every release, so there is no reason to bump major version.
embedding-shape•57m ago
I bet nginx doesn't even follow semantic versioning, which you seem to be talking about.
chasd00•58m ago
anyone can choose any version string convention they want for their project. Comparing two different pieces of software by their version string doesn't make sense.
danslo•1h ago
This one's pretty bad but there are some preconditions.

Requires a "rewrite" directive with a questionmark in the replacement string, and then a subsequent "set" directive that references a regex capture group (e.g. set $var $1).

Also the POC assumes ASLR is disabled.

dsr_•1h ago
Does any distro disable ASLR by default?

If you were to do it by hand, nginx doesn't come to mind as a likely candidate.

argee•1h ago
Example: https://github.com/DepthFirstDisclosures/Nginx-Rift/blob/mai...
jcalvinowens•1h ago
The POC disables aslr: https://github.com/DepthFirstDisclosures/Nginx-Rift/blob/mai...
linkregister•55m ago
Worker processes are forked from the master, which means they receive the same memory layout. You get unlimited crashes against the worker. There's probably a way to exploit that to get a read oracle. At the very least this is a reliable denial of service.

Depth First's full writeup: https://depthfirst.com/research/nginx-rift-achieving-nginx-r...

jcalvinowens•39m ago
Sure, but I think the github README ought to make it more clear the POC as-is doesn't work against nginx on any current Linux distro.
ChrisArchitect•59m ago
Better links:

https://depthfirst.com/research/nginx-rift-achieving-nginx-r... (https://news.ycombinator.com/item?id=48126029)

https://depthfirst.com/nginx-rift (https://news.ycombinator.com/item?id=48123365)

panzi•55m ago
Does Debian 12 have this patched? But I guess I'm not affected if I don't use `rewrite` or `set` anywhere?
iririririr•11m ago
I find it very unlikely that anyone using nginx does NOT use `set` at least.

Most nginx use cases are to end tls and then pass the request to node/php/go/etc. So, I bet you have at least one set with attacker controller data on a line like 'proxy_set_header X-Host $host;'

neomantra•48m ago
The official F5 page is here: https://my.f5.com/manage/s/article/K000161019

As noted elsewhere, ASLR protects you. While you are waiting for your affected platform to get the fix, they note the mitigation:

"use named captures instead of unnamed captures in rewrite definition"

"To mitigate this vulnerability for this example, replace $1 and $2 with the appropriate named captures, $user_id and $section"

F5 patched 1.31.0 and 1.30.1.

OpenResty has a patch for 1.27 and 1.29: https://github.com/openresty/openresty/commit/ee60fb9cf645c9...

You can track OpenResty's (a Lua application server based on Nginx) progress here: https://github.com/openresty/openresty/issues/1119

RagingCactus•47m ago
As a security person it is tiring to see so many people here either directly claim or at least allude to the claim that this is somehow much less scary because the _published_ exploit does not bypass ASLR. The writeup claims there is a way to reliably bypass ASLR with this attack. And that is a good default assumption I would be willing to believe without evidence.

ASLR is a defense-in-depth technique intended to make exploitation more difficult. In almost all cases it is only a matter of time and skill to also include an ASLR bypass. Both requirements continue being lowered by LLM agents every few weeks. It is only a matter of time (and probably not a lot of time) until a fully weaponized exploit is developed. It may be published, it may also be kept private.

It is straight up wrong to say "if you have ASLR enabled, you're not at any risk from this" and saying this is extremely harmful for anyone that trusts claims like that.

This wrong belief that you shouldn't care about security vulnerabilities because mitigations may make exploitation more difficult has already caused so much harm in the past. Be glad that modern mitigations exist, but patch your stuff asap. If you are a vendor, do not treat vulnerability reports as invalid because the researcher has not provided an ASLR bypass. Fix the root cause and hope mitigations buy you enough time to patch before you get owned.

embedding-shape•22m ago
> and saying this is extremely harmful for anyone that trusts claims like that.

Kind of feels like the burden is on the one who is reading it though, good luck stopping people from spreading misinformation on the internet, most of them don't even know they're wrong.

What's extremely harmful is trusting random internet comments stating stuff confidently. Get good at seeing through that, and it'll serve you well in security and beyond.

ptx•26m ago
Is there a good alternative to Apache and Nginx that's written in a memory safe language and not full of security holes? I briefly looked at Jetty (written in Java) and Caddy (written in Go) but they seem to have a history of vulnerabilities of other types (e.g. shell injection in Jetty) so I'm not sure they would be any better.
embedding-shape•21m ago
Caddy been a breeze to use, bit sucky model with "we have thousands of binaries depending on what combination of plugins you want" instead of a proper plugin system, but if you're building it from source, it's pretty nifty and simple anyways.
pjmlp•3m ago
Looks into the CVE, ah an heap memory corruption, business as usual.

Removing the modem and GPS from my 2024 rav4 hybrid

https://arkadiyt.com/2026/05/13/removing-the-modem-and-gps-from-my-rav4/
143•arkadiyt•1h ago•51 comments

RTX 5090 and M4 MacBook Air: Can It Game?

https://scottjg.com/posts/2026-05-05-egpu-mac-gaming/
264•allenleee•2h ago•75 comments

New Nginx Exploit

https://github.com/DepthFirstDisclosures/Nginx-Rift
104•hetsaraiya•1h ago•29 comments

HDD Firmware Hacking

https://icode4.coffee/?p=1465
40•jsploit•2h ago•1 comments

Computer Hobby Movement in Canada

https://museum.eecs.yorku.ca/exhibits/show/hobby_canada/hobby_canada
144•rbanffy•5h ago•38 comments

God Damn AI is making me dumb

https://jpain.io/god-damn-ai-is-making-me-dumb/
13•Eighth•24m ago•3 comments

MIT: 20% drop in incoming graduate students

https://president.mit.edu/writing-speeches/video-transcript-message-president-kornbluth-about-fun...
464•dmayo•3h ago•458 comments

Fossils show millipede and centipede ancestors evolved legs underwater

https://phys.org/news/2026-05-ancient-sea-fossils-millipede-centipede.html
40•gmays•2d ago•2 comments

Terranox AI (YC W26) Is Hiring a Founding AI/ML Engineer and Summer AI/ML Intern

https://www.workatastartup.com/companies/terranox-ai
1•jadecheclair•1h ago

Int a = 5; a = a++ + ++a; a =? (2011)

https://gynvael.coldwind.pl/?id=372
15•e-topy•2d ago•20 comments

On The Conflation of Money and Things

https://lithub.com/is-it-even-real-on-the-conflation-of-money-and-things/
41•bookofjoe•3h ago•11 comments

Claude AI recovers an 11 yrs old BTC wallet holding 400k USD

https://www.tomshardware.com/tech-industry/cryptocurrency/bitcoin-trader-recovers-usd400-000-usin...
272•cednore•3h ago•140 comments

EditLens: Quantifying the extent of AI editing in text (2025)

https://arxiv.org/abs/2510.03154
17•horseradish•23h ago•0 comments

Claude for Small Business

https://www.anthropic.com/news/claude-for-small-business
487•neilfrndes•14h ago•432 comments

60fps Video on a CGA? – The GlyphBlaster

https://martypc.blogspot.com/2026/05/60fps-video-on-cga-glyphblaster.html
41•tambourine_man•4d ago•6 comments

Show HN: Running the second public ODoH relay

https://numa.rs/blog/posts/odoh-anonymous-dns-without-an-account.html
101•rdme•7h ago•32 comments

Scorched Earth 2000 – Web

http://www.scorch2000.com/web/
360•meshko•18h ago•141 comments

Myths about /dev/urandom (2014)

https://www.2uo.de/myths-about-urandom/
73•signa11•7h ago•38 comments

The Tree House: A voyage to the source of a backyard dream

https://www.laphamsquarterly.org/roundtable/tree-house
57•Caiero•2d ago•7 comments

Leaving the Physical World

https://www.eff.org/pages/leaving-physical-world
158•andsoitis•4d ago•70 comments

Sam Altman's Business Dealings Under GOP Scrutiny Ahead of OpenAI's IPO

https://www.wsj.com/tech/ai/sam-altmans-business-dealings-under-gop-scrutiny-ahead-of-openais-ipo...
170•1vuio0pswjnm7•6h ago•117 comments

Apple-OpenAI Relationship Frays, Setting Up Possible Legal Fight

https://www.bloomberg.com/news/articles/2026-05-14/openai-apple-partnership-frays-setting-up-poss...
34•helsinkiandrew•1h ago•15 comments

What's in a GGUF, besides the weights – and what's still missing?

https://nobodywho.ooo/posts/whats-in-a-gguf/
4•bashbjorn•1h ago•0 comments

Andreessen Horowitz Is Spending on Politics Like No Other

https://www.nytimes.com/2026/05/13/technology/andreessen-horowitz-politics.html
10•01-_-•46m ago•1 comments

USDA Projects Smallest US Wheat Harvest Since 1972 Due to Plains Drought

https://www.agweb.com/news/usda-projects-smallest-us-wheat-harvest-1972-due-plains-drought
208•littlexsparkee•5h ago•137 comments

Bun's Rust rewrite has been merged

https://old.reddit.com/r/rust/comments/1tcrmjs/rewrite_bun_in_rust_has_been_merged/
65•ale•1h ago•52 comments

Anthropic forms $200M partnership with the Gates Foundation

https://www.anthropic.com/news/gates-foundation-partnership
99•surprisetalk•3h ago•75 comments

Deal reached with hackers to delete data stolen from the Canvas platform

https://www.nbcnews.com/tech/tech-news/deal-reached-hackers-delete-data-stolen-canvas-educational...
19•fortran77•59m ago•11 comments

A Claude Code and Codex Skill for Deliberate Skill Development

https://github.com/DrCatHicks/learning-opportunities
193•cdrnsf•15h ago•43 comments

Saying Goodbye to one line of APL

https://homewithinnowhere.com/posts/2026-05-10-one-line.html#fnref1
66•tosh•3d ago•20 comments