Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12.
References
Link | Resource |
---|---|
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8 | Vendor Advisory |
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-01-29 17:15
Updated : 2024-11-21 08:58
NVD link : CVE-2024-23828
Mitre link : CVE-2024-23828
CVE.ORG link : CVE-2024-23828
JSON object : View
Products Affected
nginxui
- nginx_ui
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')