On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-28119 | On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://support.f5.com/csp/article/K57735782 |
|
History
No history.
Status: PUBLISHED
Assigner: f5
Published:
Updated: 2024-08-03T03:28:42.829Z
Reserved: 2022-01-10T00:00:00
Link: CVE-2022-23008
No data.
Status : Modified
Published: 2022-01-25T20:15:09.000
Modified: 2024-11-21T06:47:47.630
Link: CVE-2022-23008
No data.
OpenCVE Enrichment
No data.
EUVD