<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[https:&#x2F;&#x2F;depthfirst.com&#x2F;nginx-rift]]></title><description><![CDATA[<p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://depthfirst.com/nginx-rift" title="NGINX Rift">
<img src="https://depthfirst.com/images/depthfirst-og.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://depthfirst.com/nginx-rift">
NGINX Rift
</a>
</h5>
<p class="card-text line-clamp-3">An 18 year old memory corruption flaw in NGINX Plus and NGINX Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests.</p>
</div>
<a href="https://depthfirst.com/nginx-rift" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://depthfirst.com/favicon.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />







<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(depthfirst.com)</span></p>
</a>
</div><p></p><p>Anyone running nginx? Noone does that right?</p><p><a href="https://milliways.social/tags/nginx" rel="tag">#<span>nginx</span></a> <a href="https://milliways.social/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://milliways.social/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/83a61cdf-5893-418c-a965-39da5323241b/https-depthfirst.com-nginx-rift</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:38:10 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/83a61cdf-5893-418c-a965-39da5323241b.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 14 May 2026 09:43:27 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to https:&#x2F;&#x2F;depthfirst.com&#x2F;nginx-rift on Thu, 14 May 2026 10:37:27 GMT]]></title><description><![CDATA[<p><span><a href="/user/mcfly%40milliways.social">@<span>mcfly</span></a></span> if anyone is I’ve made a plugin for gixy-next to check for the rewrite directives that might be an issue.</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">

<div class="card-body">
<h5 class="card-title">
<a href="https://mstdn.social/@aimaz/116572448465580321">
Stephen Paulger (@aimaz@mstdn.social)
</a>
</h5>
<p class="card-text line-clamp-3">If anyone is worrying about their NGINX configs because of CVE-2026-42945 I’ve made a fork of gixy-next with a plugin to help find rewrite configs that might be a problem.

https://github.com/stephenpaulger/Gixy-Next/tree/add-unnamed-group-plugin

I’ll send a merge request but in the meantime my fork’s branch might be useful. Obviously, don’t just trust me, review my change, it’s small enough.

#nginx #CyberSecurity #cve_2026_42945</p>
</div>
<a href="https://mstdn.social/@aimaz/116572448465580321" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://mstdn.social/packs/assets/favicon-16x16-74JBPGmr.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





























<p class="d-inline-block text-truncate mb-0">Mastodon 🐘 <span class="text-secondary">(mstdn.social)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://mstdn.social/users/aimaz/statuses/116572490785309994</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mstdn.social/users/aimaz/statuses/116572490785309994</guid><dc:creator><![CDATA[aimaz@mstdn.social]]></dc:creator><pubDate>Thu, 14 May 2026 10:37:27 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;depthfirst.com&#x2F;nginx-rift on Thu, 14 May 2026 09:52:48 GMT]]></title><description><![CDATA[<p><span><a href="/user/mcfly%40milliways.social">@<span>mcfly</span></a></span> </p><p>&gt; The bug is reachable only when an unnamed PCRE capture is paired with a replacement string that contains a question mark, followed by a rewrite, if, or set directive in the same scope.</p><p>… Gesundheit?</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/equinox/statuses/116572315202890589</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/equinox/statuses/116572315202890589</guid><dc:creator><![CDATA[equinox@chaos.social]]></dc:creator><pubDate>Thu, 14 May 2026 09:52:48 GMT</pubDate></item><item><title><![CDATA[Reply to https:&#x2F;&#x2F;depthfirst.com&#x2F;nginx-rift on Thu, 14 May 2026 09:49:19 GMT]]></title><description><![CDATA[<p><span><a href="/user/mcfly%40milliways.social">@<span>mcfly</span></a></span> the vulnerable rewrite looks suspicious even without the flaw <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f604.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--smile" style="height:23px;width:auto;vertical-align:middle" title=":D" alt="😄" /></p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/cy/statuses/116572301519588073</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/cy/statuses/116572301519588073</guid><dc:creator><![CDATA[cy@chaos.social]]></dc:creator><pubDate>Thu, 14 May 2026 09:49:19 GMT</pubDate></item></channel></rss>