naxsi

Security Advisories

Because nobody’s perfect and coding while drunk is dangerous !

Reporting Vulnerabilities and Security Issues

As stated on the project’s homepage, you can send me an email directly. Or, you can use the issues

NO-CVE: [Medium-Low] Potential bypass on SQL keywords for IIS/ASP

Naxsi does not suppress/decode incorrectly url-encoded characters. On the other hand, IIS/ASP will treat “s%e%l%e%c%t” as “select”, while naxsi will still see it as “s%e%l%e%c%t”, thus rendering SQL keywords rule ineffective. Only the SQL-keywords rule is affected, thus the exploitation window is limited to quote-less, two-fields (max) SQL injections.

CVE-2012-3380: [Medium] Potential file disclosure in naxsi’s nx_extract

Local includes in nx_extract are not properly filtered, allowing a remote attacker to disclose files local to nx_extract. More details https://code.google.com/p/naxsi/source/detail?r=307

NO-CVE: [Low] SQL Injection in naxsi’s nx_intercept

Ironically, an SQL Injection is present in naxsi’s new python learning daemon (nx_intercept.py). The vulnerability is rated as low, as: