// For flags

CVE-2024-22198

Authenticated (user role) arbitrary command execution by modifying `start_cmd` setting (GHSL-2023-268)

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9.

Nginx-UI es una interfaz web para administrar configuraciones de Nginx. Es vulnerable a la ejecución de comandos arbitrarios al abusar de los ajustes de configuración. La página `Home > Preferences` expone una lista de configuraciones del sistema como `Run Mode`, `Jwt Secret`, `Node Secret` y `Terminal Start Command`. Si bien la interfaz de usuario no permite a los usuarios modificar la configuración del "Terminal Start Command", es posible hacerlo enviando una solicitud a la API. Este problema puede provocar la ejecución remota de código autenticado, escalada de privilegios y divulgación de información. Esta vulnerabilidad ha sido parcheada en la versión 2.0.0.beta.9.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-01-08 CVE Reserved
  • 2024-01-11 CVE Published
  • 2024-08-01 CVE Updated
  • 2024-08-01 First Exploit
  • 2024-10-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
< 2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version " < 2.0.0"
-
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta1
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta2
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta3
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta4
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta4_patch
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta5
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta5_patch
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta6
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta6_patch
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta6_patch2
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta7
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta8
Affected
Nginxui
Search vendor "Nginxui"
Nginx Ui
Search vendor "Nginxui" for product "Nginx Ui"
2.0.0
Search vendor "Nginxui" for product "Nginx Ui" and version "2.0.0"
beta8_patch
Affected