icon

We found results for “

CVE-2024-22197

Good to know:

icon

Date: January 11, 2024

Nginx-ui is online statistics for Server Indicators​​ Monitor CPU usage, memory usage, load average, and disk usage in real-time. The "Home > Preference" page exposes a small list of nginx settings such as "Nginx Access Log Path" and "Nginx Error Log Path". However, the API also exposes "test_config_cmd", "reload_cmd" and "restart_cmd". While the UI doesn't allow users to modify any of these settings, it is possible to do so by sending a request to the API. This issue may lead to authenticated Remote Code Execution, Privilege Escalation, and Information Disclosure. This issue has been patched in version 2.0.0.beta.9.

Language: Go

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-77

Top Fix

icon

Upgrade Version

Upgrade to version github.com/0xJacky/Nginx-UI - v1.9.10-0.20231219184941-827e76c46e63

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): LOW

Do you need more information?

Contact Us