CVE-2024-22198

Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.
Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.1 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
GitHub_MCNA
7.1 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
nginxuinginx_ui
𝑥
< 2.0.0
nginxuinginx_ui
2.0.0:beta1
nginxuinginx_ui
2.0.0:beta2
nginxuinginx_ui
2.0.0:beta3
nginxuinginx_ui
2.0.0:beta4
nginxuinginx_ui
2.0.0:beta4_patch
nginxuinginx_ui
2.0.0:beta5
nginxuinginx_ui
2.0.0:beta5_patch
nginxuinginx_ui
2.0.0:beta6
nginxuinginx_ui
2.0.0:beta6_patch
nginxuinginx_ui
2.0.0:beta6_patch2
nginxuinginx_ui
2.0.0:beta7
nginxuinginx_ui
2.0.0:beta8
nginxuinginx_ui
2.0.0:beta8_patch
𝑥
= Vulnerable software versions