Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1xY2pxLTdmN3YtcHZjOM4AA47s

Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF

Summary

Fix bypass to the following bugs

Allowing to inject directly in the app.ini via CRLF to change the value of test_config_cmd and start_cmd resulting in an Authenticated RCE

Impact

Authenticated Remote execution on the host

Permalink: https://github.com/advisories/GHSA-qcjq-7f7v-pvc8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xY2pxLTdmN3YtcHZjOM4AA47s
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 3 months ago
Updated: 3 months ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-qcjq-7f7v-pvc8, CVE-2024-23828
References: Repository: https://github.com/0xJacky/nginx-ui
Blast Radius: 1.0

Affected Packages

go:github.com/0xJacky/Nginx-UI
Dependent packages: 0
Dependent repositories: 0
Downloads:
Affected Version Ranges: < 2.0.0-beta.12
Fixed in: 2.0.0-beta.12
All affected versions: 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.5.1, 1.5.2, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.5, 1.6.6, 1.6.7, 1.6.8, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.7.6, 1.7.7, 1.7.8, 1.7.9, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.9.9
All unaffected versions: