jc21 NGINX Proxy Manager before 2.11.3 allows backend/internal/certificate.js OS command injection by an authenticated user (with certificate management privileges) via untrusted input to the DNS provider configuration. NOTE: this is not part of any NGINX software shipped by F5.
References
Configurations
History
02 Oct 2025, 13:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jc21:nginx_proxy_manager:*:*:*:*:*:*:*:* | |
| First Time |
Jc21
Jc21 nginx Proxy Manager |
|
| References | () https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc46 - Patch | |
| References | () https://github.com/NginxProxyManager/nginx-proxy-manager/compare/v2.11.2...v2.11.3 - Release Notes | |
| References | () https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3662 - Issue Tracking |
Information
Published : 2024-07-04 21:15
Updated : 2025-10-02 13:12
NVD link : CVE-2024-39935
Mitre link : CVE-2024-39935
CVE.ORG link : CVE-2024-39935
JSON object : View
Products Affected
jc21
- nginx_proxy_manager
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
