Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.
References
Configurations
Configuration 1 (hide)
|
History
18 Jan 2024, 19:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 20:15
Updated : 2024-02-05 00:22
NVD link : CVE-2024-22198
Mitre link : CVE-2024-22198
CVE.ORG link : CVE-2024-22198
JSON object : View
Products Affected
nginxui
- nginx_ui
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')