CVE-2024-23827
high-risk
Published 2024-01-29
Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.
Do I need to act?
~
3.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Nginx Ui
Affected Vendors
References (2)
Third Party Advisory
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m
Third Party Advisory
https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m
67
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
29/34 · Critical