CVE-2024-22198
Description
Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The Home \> Preference
page exposes a list of system settings such as Run Mode
, Jwt Secret
, Node Secret
and Terminal Start Command
. While the UI doesn't allow users to modify the Terminal Start Command
setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.
- CVSS Version 3.1
nvd
CVE ID: CVE-2024-22198
Base Score: 8.8
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
github
CVE ID: CVE-2024-22198
Base Score: 7.1
Base Severity: HIGH
Vector String:CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
Impact Score: 5.5
Exploitability Score: 1.6
Proof Of Concept
xiw1ll
Identify Nginx-ui version and check if it's vulnerable to CVE-2024-22198
Refrence: GitHub