- This vulnerability might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. [CVE-2018-16845]
# grep -ir mp4 /etc/cb/nginx
/etc/cb/nginx/mime.types: video/mp4 mp4;
- One can also ask dump the running config from nginx with the –T option.
- First, find the path for nginx:
# pgrep nginx | xargs -I PID ls -l /proc/PID/exe
lrwxrwxrwx. 1 root root 0 Nov 19 16:32 /proc/112343/exe -> /usr/local/openresty/nginx/sbin/nginx
lrwxrwxrwx. 1 cb cb 0 Nov 19 16:32 /proc/112344/exe -> /usr/local/openresty/nginx/sbin/nginx
lrwxrwxrwx. 1 cb cb 0 Nov 19 16:32 /proc/112345/exe -> /usr/local/openresty/nginx/sbin/nginx
lrwxrwxrwx. 1 cb cb 0 Nov 19 16:32 /proc/112346/exe -> /usr/local/openresty/nginx/sbin/nginx
lrwxrwxrwx. 1 cb cb 0 Nov 19 16:32 /proc/112347/exe -> /usr/local/openresty/nginx/sbin/nginx
# /usr/local/openresty/nginx/sbin/nginx –T
- That will show the contents of every file nginx sourced. A search (grep) for mp4 will only find it in the mime.types file. That file is only used to define mime types, it does not mean the mp4 module loaded.
# /usr/local/openresty/nginx/sbin/nginx -T 2>/dev/null | grep mp4
video/mp4