A Command injection vulnerability in requestLetsEncryptSsl in NginxProxyManager 2.11.3 allows an attacker to RCE via Add Let's Encrypt Certificate.
References
Configurations
History
03 Jun 2025, 11:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jc21:nginx_proxy_manager:2.11.3:*:*:*:*:*:*:* | |
First Time |
Jc21
Jc21 nginx Proxy Manager |
|
References | () https://github.com/NginxProxyManager/nginx-proxy-manager/blob/v2.11.3/backend/internal/certificate.js#L830 - Product | |
References | () https://github.com/NginxProxyManager/nginx-proxy-manager/commit/99cce7e2b0da2978411cedd7cac5fffbe15bc466 - Product | |
References | () https://github.com/NginxProxyManager/nginx-proxy-manager/pull/4073/commits/c39d5433bcd13993def222bbb2b6988bbb810a05 - Patch | |
References | () https://github.com/barttran2k/POC_CVE-2024-46256 - Exploit |
Information
Published : 2024-09-27 18:15
Updated : 2025-06-03 11:55
NVD link : CVE-2024-46256
Mitre link : CVE-2024-46256
CVE.ORG link : CVE-2024-46256
JSON object : View
Products Affected
jc21
- nginx_proxy_manager
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')