Nginx-UI authenticated RCE through injecting into the application config via CRLF
CVE-2024-23828

8.8HIGH

Key Information:

Vendor

0xJacky

Status
Vendor
CVE Published:
29 January 2024

What is CVE-2024-23828?

Nginx-UI, a web interface tailored for managing Nginx configurations, presents a vulnerability that allows authenticated users to execute arbitrary commands through a CRLF attack. This issue arises when the settings for 'test_config_cmd' or 'start_cmd' are altered, potentially compromising system integrity. The vulnerability is a result of an incomplete resolution for previously identified issues, namely CVE-2024-22197 and CVE-2024-22198. The developer has issued a patch addressing this flaw in version 2.0.0.beta.12.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

nginx-ui < v2.0.0.beta.12

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.