Skip to main content

CVE-2024-22198

Description

Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The Home \> Preference page exposes a list of system settings such as Run Mode, Jwt Secret, Node Secret and Terminal Start Command. While the UI doesn't allow users to modify the Terminal Start Command setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.

nvd
CVE ID: CVE-2024-22198
Base Score: 8.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
github
CVE ID: CVE-2024-22198
Base Score: 7.1
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
Impact Score: 5.5
Exploitability Score: 1.6

Proof Of Concept

xiw1ll

Identify Nginx-ui version and check if it's vulnerable to CVE-2024-22198

Refrence: GitHub

Refrence: NVDMITRE