Vulnerability Description
Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Nginxui | Nginx Ui | 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227mThird Party Advisory
- https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227mThird Party Advisory
FAQ
What is CVE-2024-23827?
CVE-2024-23827 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certificat...
How severe is CVE-2024-23827?
CVE-2024-23827 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-23827?
Check the references section above for vendor advisories and patch information. Affected products include: Nginxui Nginx Ui.