<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NGINX JavaScript — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nginx-javascript/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 15:19:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nginx-javascript/feed.xml" rel="self" type="application/rss+xml"/><item><title>NGINX JavaScript Heap Buffer Overflow Vulnerability (CVE-2026-8711)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nginx-js-heap-overflow/</link><pubDate>Tue, 19 May 2026 15:19:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nginx-js-heap-overflow/</guid><description>NGINX JavaScript is vulnerable to a heap buffer overflow (CVE-2026-8711) when the js_fetch_proxy directive is configured with client-controlled variables and ngx.fetch(), allowing unauthenticated attackers to cause worker process restarts or, with ASLR disabled, code execution via crafted HTTP requests.</description><content:encoded><![CDATA[<p>NGINX JavaScript is susceptible to a heap buffer overflow vulnerability (CVE-2026-8711). The vulnerability occurs when the <code>js_fetch_proxy</code> directive is configured with at least one client-controlled NGINX variable (e.g., <code>$http_*</code>, <code>$arg_*</code>, <code>$cookie_*</code>) and a location invoking the <code>ngx.fetch()</code> operation from NGINX JavaScript. An unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests to the affected NGINX server. Successful exploitation may lead to a heap buffer overflow in the NGINX worker process, resulting in a restart of the process. Furthermore, on systems where Address Space Layout Randomization (ASLR) is disabled, this vulnerability could potentially lead to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious HTTP request containing specially crafted data within headers, arguments, or cookies.</li>
<li>The attacker sends the crafted HTTP request to the targeted NGINX server.</li>
<li>NGINX receives the request and processes it according to the server configuration.</li>
<li>The <code>js_fetch_proxy</code> directive is triggered due to the request matching a configured location.</li>
<li>The <code>ngx.fetch()</code> operation is invoked from the NGINX JavaScript code within the triggered location.</li>
<li>The JavaScript code utilizes a client-controlled NGINX variable (e.g., <code>$http_*</code>, <code>$arg_*</code>, <code>$cookie_*</code>) as part of the <code>ngx.fetch()</code> operation&rsquo;s configuration or parameters.</li>
<li>Due to insufficient input validation or sanitization, the crafted data from the client-controlled variable causes a heap buffer overflow during the processing of the <code>ngx.fetch()</code> operation.</li>
<li>The heap buffer overflow corrupts memory within the NGINX worker process, leading to a process restart, or, with ASLR disabled, potentially code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition due to the NGINX worker process restarting. On systems with ASLR disabled, successful exploitation can lead to arbitrary code execution, potentially allowing the attacker to gain full control of the affected system. The scope of impact depends on the specific configuration of NGINX and the JavaScript code used.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patch or upgrade to the latest version of NGINX JavaScript to remediate CVE-2026-8711.</li>
<li>Review NGINX configurations to identify instances where the <code>js_fetch_proxy</code> directive is used with client-controlled variables and <code>ngx.fetch()</code>. Implement robust input validation and sanitization to mitigate potential buffer overflows.</li>
<li>Enable Address Space Layout Randomization (ASLR) on systems running NGINX to mitigate the risk of code execution in the event of a successful buffer overflow.</li>
<li>Deploy the Sigma rules provided below to detect exploitation attempts targeting CVE-2026-8711.</li>
<li>Monitor NGINX logs for unusual HTTP requests containing potentially malicious payloads in headers, arguments, or cookies that are being used with the vulnerable directive (see example requests in positive tests below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>heap-buffer-overflow</category><category>nginx</category></item></channel></rss>