Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0401 Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12.
Github GHSA Github GHSA GHSA-qcjq-7f7v-pvc8 Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-11-12T21:31:32.752Z

Reserved: 2024-01-22T22:23:54.338Z

Link: CVE-2024-23828

cve-icon Vulnrichment

Updated: 2024-08-01T23:13:08.485Z

cve-icon NVD

Status : Modified

Published: 2024-01-29T17:15:10.457

Modified: 2024-11-21T08:58:30.527

Link: CVE-2024-23828

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.