CVE-2024-22198
11.01.2024, 20:15
Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.
Vendor | Product | Version |
---|---|---|
nginxui | nginx_ui | 𝑥 < 2.0.0 |
nginxui | nginx_ui | 2.0.0:beta1 |
nginxui | nginx_ui | 2.0.0:beta2 |
nginxui | nginx_ui | 2.0.0:beta3 |
nginxui | nginx_ui | 2.0.0:beta4 |
nginxui | nginx_ui | 2.0.0:beta4_patch |
nginxui | nginx_ui | 2.0.0:beta5 |
nginxui | nginx_ui | 2.0.0:beta5_patch |
nginxui | nginx_ui | 2.0.0:beta6 |
nginxui | nginx_ui | 2.0.0:beta6_patch |
nginxui | nginx_ui | 2.0.0:beta6_patch2 |
nginxui | nginx_ui | 2.0.0:beta7 |
nginxui | nginx_ui | 2.0.0:beta8 |
nginxui | nginx_ui | 2.0.0:beta8_patch |
𝑥
= Vulnerable software versions
References