cve/2024/CVE-2024-23828.md

18 lines
961 B
Markdown
Raw Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2024-23828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23828)
![](https://img.shields.io/static/v1?label=Product&message=nginx-ui&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%20v2.0.0.beta.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to an authenticated arbitrary command execution via CRLF attack when changing the value of test_config_cmd or start_cmd. This vulnerability exists due to an incomplete fix for CVE-2024-22197 and CVE-2024-22198. This vulnerability has been patched in version 2.0.0.beta.12.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/oxagast/oxasploits