<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NGINX Plus — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nginx-plus/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:26:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nginx-plus/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-42945: NGINX ngx_http_rewrite_module Heap Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-05-nginx-heap-overflow/</link><pubDate>Wed, 13 May 2026 16:26:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nginx-heap-overflow/</guid><description>NGINX Plus and NGINX Open Source are vulnerable to a heap buffer overflow (CVE-2026-42945) due to crafted HTTP requests when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed PCRE capture with a replacement string that includes a question mark, potentially leading to denial of service or code execution.</description><content:encoded><![CDATA[<p>NGINX Plus and NGINX Open Source are susceptible to a heap buffer overflow vulnerability (CVE-2026-42945) within the <code>ngx_http_rewrite_module</code>. This flaw arises when the <code>rewrite</code> directive is used in conjunction with a subsequent <code>rewrite</code>, <code>if</code>, or <code>set</code> directive, and an unnamed Perl-Compatible Regular Expression (PCRE) capture (e.g., <code>$1</code>, <code>$2</code>) includes a question mark (<code>?</code>) within its replacement string. An unauthenticated attacker, by sending specially crafted HTTP requests, can exploit this condition. Successful exploitation can lead to a heap buffer overflow in the NGINX worker process, resulting in a restart and potential denial of service. On systems where Address Space Layout Randomization (ASLR) is disabled, successful exploitation may lead to arbitrary code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious HTTP request targeting a vulnerable NGINX server. This request is designed to trigger the flawed rewrite logic.</li>
<li>The request contains a specific URI or header that will be processed by the <code>ngx_http_rewrite_module</code>.</li>
<li>The NGINX configuration utilizes the <code>rewrite</code> directive followed by either <code>rewrite</code>, <code>if</code>, or <code>set</code>.</li>
<li>The <code>rewrite</code> directive uses an unnamed PCRE capture (e.g., $1, $2) with a replacement string.</li>
<li>The replacement string within the PCRE capture includes a question mark (<code>?</code>). This is a crucial component of the exploit.</li>
<li>When the NGINX worker processes the crafted request and applies the rewrite rules, the question mark within the PCRE capture&rsquo;s replacement string causes a heap buffer overflow.</li>
<li>The heap buffer overflow corrupts memory within the NGINX worker process.</li>
<li>The corruption leads to a crash of the NGINX worker process, causing a restart and potential denial of service. On systems with ASLR disabled, the attacker might achieve code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-42945 can lead to a denial-of-service condition, as the NGINX worker process crashes and restarts. This can disrupt web services and applications served by the affected NGINX instance. In scenarios where ASLR is disabled, the attacker could potentially achieve arbitrary code execution on the server, leading to complete system compromise. The number of affected systems depends on the prevalence of vulnerable NGINX configurations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the official patch or upgrade to a version of NGINX Plus or NGINX Open Source that addresses CVE-2026-42945.</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts targeting CVE-2026-42945 in your NGINX webserver logs.</li>
<li>Enable Address Space Layout Randomization (ASLR) on systems running NGINX to mitigate potential code execution following a heap overflow.</li>
<li>Review NGINX configurations for instances of the <code>rewrite</code> directive used in conjunction with <code>rewrite</code>, <code>if</code>, or <code>set</code> and unnamed PCRE captures containing question marks (<code>?</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>CVE-2026-42945</category><category>nginx</category><category>heap overflow</category><category>denial of service</category><category>webserver</category></item></channel></rss>