OS Command Injection Through Port Scanning on Roxy-WI Web Interface
CVE-2024-43804

8.8HIGH

Key Information:

Vendor
Roxy-wi
Status
Roxy-wi
Vendor
CVE Published:
29 August 2024

Summary

An OS Command Injection vulnerability in Roxy-WI, a web interface used for managing Haproxy, Nginx, Apache, and Keepalived servers, permits an authenticated user to execute arbitrary commands on the server. This vulnerability arises from insufficient validation of user inputs during the construction and execution of OS commands, particularly in the port scanning feature. When the application processes JSON POST data, if the 'id' key is absent, the value from the 'ip' key is assigned to the 'ip' variable. Since this variable can be manipulated by the attacker without proper sanitization, it is directly used in command construction. The subsequent invocation of the server_mod.subprocess_execute function allows the execution of potentially harmful OS commands through subprocess.Popen() with shell=True, posing significant security risks. Users should reach out to Roxy-WI for patch coordination and to mitigate exposure to this vulnerability.

Affected Version(s)

roxy-wi <= 8.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.