DepthFirstDisclosures

exploit for CVE-2026-42945

389
75
100% credibility
Found May 14, 2026 at 437 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

A proof-of-concept demonstration of a critical remote code execution vulnerability in NGINX web servers using rewrite rules, including a test environment and exploit script.

How It Works

1
🔍 Discover the Security Alert

You hear about a hidden weakness in popular web software that could let outsiders take control, and find this simple demo to see it in action.

2
🛠️ Prepare the Test Playground

You follow a quick guide to set up a safe, isolated space on your computer to mimic the vulnerable setup without any risk to real websites.

3
▶️ Launch the Pretend Server

With one command, you start a fake version of the web server that has the exact flaw, ready for testing.

4
💥 Trigger the Break-In Demo

You run a short test script that sends sneaky messages to expose the weakness and run a command inside the fake server, like writing a note to prove it worked.

5
🔎 Verify the Proof

You peek inside the test area and see your note or get a connection back, confirming the security hole is real.

Mission Accomplished

You've safely demonstrated the issue, learned how it works, and know which updates fix it—now you can protect real servers.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 437 to 389 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Nginx-Rift?

Nginx-Rift is a Python proof-of-concept exploit for CVE-2026-42945, a critical heap buffer overflow in NGINX that enables unauthenticated remote code execution on servers using rewrite and set directives. Affected versions span NGINX Open Source from 0.6.27 to 1.30.0 and NGINX Plus R32 to R36; it ships with a Docker setup to spin up a vulnerable server for testing. Run `python poc.py --shell` for a reverse shell or `--cmd` to execute arbitrary commands, mimicking high-impact bugs like the eternalblue exploit github.

Why is it gaining traction?

With 389 stars, it stands out for its reliable RCE demo on real NGINX setups, complete with Docker Compose for instant vuln reproduction—unlike scattered nextcloud exploit github repos lacking environments. The autonomous discovery story by depthfirst hooks security devs, and its clean CLI delivers shells without fuss, echoing exploit github as infinite storage for battle-tested payloads. Python simplicity means quick adaptation for custom attacks.

Who should use this?

Security researchers validating NGINX patches before upgrades. Pentesters targeting legacy web servers in red team ops. DevOps teams auditing rewrite-heavy configs for rift-like flaws in production.

Verdict

Grab it if you're in security and need a CVE-2026-42945 benchmark—solid docs and Docker make it dead simple, despite 389 stars signaling early maturity. The 1.0% credibility score flags caution on unvetted forks; stick to originals for exploits.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.