Command-Line Argument Vulnerability in NGINX Controller by F5 Networks
CVE-2020-5866
5.5MEDIUM
Summary
In NGINX Controller prior to version 3.3.0, a security issue exists due to the helper.sh script utilizing sensitive data as command-line arguments. This could potentially expose sensitive information to unauthorized parties, making it crucial for users to upgrade to the latest version to mitigate risks.
Affected Version(s)
NGINX Controller < 3.3.0
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved