gsd-2024-23827
Vulnerability from gsd
Modified
2024-01-23 06:02
Details
Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It's possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-23827" ], "details": "Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It\u0027s possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue.", "id": "GSD-2024-23827", "modified": "2024-01-23T06:02:22.070610Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2024-23827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nginx-ui", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003c 2.0.0.beta.12" } ] } } ] }, "vendor_name": "0xJacky" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It\u0027s possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-22", "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m", "refsource": "MISC", "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m" } ] }, "source": { "advisory": "GHSA-xvq9-4vpv-227m", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "E5EB4B0D-CE6A-45CE-8971-15BBB0722394", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "347055AA-23A7-4D03-A46B-0A51A0357EFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "9D17A6DA-3309-4029-9DAD-76ABAA1EA38A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "2E720E78-E724-4E65-9AFC-BC83E2B6405F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0F445EB2-0B0B-44D1-9A6F-A23BB7CBA264", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6D4CD22F-4078-4EA1-8790-D6FD110A2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "6FE185FE-3B3F-4E46-8812-2512B25E3AD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "861646B0-3CD6-4037-9EE4-550B9B7E5FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A7D82994-E977-4148-9E6D-EB87E77EC702", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "B30244FF-039B-44F2-AC1A-5FDB7F98A2C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "45F8125A-57BE-4E62-94A2-FBDD0BCB67E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.1:-:*:*:*:*:*:*", "matchCriteriaId": "73DB5C6F-0F75-44F4-B47F-44F3805C0E09", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.1:fix:*:*:*:*:*:*", "matchCriteriaId": "D9D6B6EA-823D-4D36-84DC-69CB14AA3120", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B31BCF4-F00E-42E1-9BCA-F7C0D164FB7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.3.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "B098A3C6-DFE3-41C5-AADB-52C36A08F566", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "5F5057DF-FA0A-4A41-BC6F-0F20529BACAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "C7F7B02B-C43C-4E57-B844-F1708125BAB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF6CBAAD-0A17-4E43-965B-C525DADCA3F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7EBA5C6E-25FC-4952-BA2C-6C44770D8861", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "BDA3575B-E64E-42AD-A12C-ADD2BD61065C", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "659E6E9F-A297-4115-884B-C4D7EE2CB155", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "4E1A2B34-9B82-429D-83E4-951344B31CAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "B43B60D3-743D-4965-B0FF-3FBDA3DFB7B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "36DB77DA-4ED4-4800-8251-EB4F4BBA4A1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta4_fix:*:*:*:*:*:*", "matchCriteriaId": "E9596AB0-0985-45A3-9EC4-4331A62E59D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "A7659CD3-117A-427A-BDAB-E9580D0CE0A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "8D398E64-80C0-4E7F-9BAB-37200FE42EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "9CF56792-52E6-4A24-8488-8DBCE0DF2E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "2D59E88D-CFF0-4039-A236-86AEFA9D6135", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "F6C8AFA8-8F62-43A3-99E3-D2BA31B94AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ED48548E-A6AB-4AE7-B70F-540F13FA3171", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C645D38E-9AF7-4334-96B0-B674A2DD0E01", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.0:-:*:*:*:*:*:*", "matchCriteriaId": "B3B50213-0F6A-4C86-A819-BC4CEC4CD6A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.0:fix:*:*:*:*:*:*", "matchCriteriaId": "5EAB6269-238F-4342-BFF3-8D52E068A797", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "830987AC-8021-4898-B031-5D158A2EBFA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "C48387B2-B727-4184-9AEE-F2641F14B96F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "8AF0BF25-8BBD-408E-AD26-2F5A5A7A8799", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "0E90DD77-C9D3-418B-A77D-6B6513F1B2CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "F01E473A-7007-43B3-8801-4EDCB94433B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "BF5C23AA-D701-4153-A798-BC62D2227E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "FD3E2589-AA3E-4FBD-9BE0-8C6343AA2D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "3F287D86-DE0B-4EFA-A59B-26142539F4C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.0:patch:*:*:*:*:*:*", "matchCriteriaId": "F6CA517E-298A-4594-A5C3-01D714B45FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "E988C01A-A8E8-4A78-86FE-D479E85D1C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3089766-C08D-46ED-96CD-FBD23918CE91", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "7556CA53-63DB-456A-9F4F-D2216577214B", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "ED7D3809-15E2-46D7-B655-872D39516423", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "10DF1FCF-60F0-4E1E-B527-038D62D70061", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "692F6EB8-A3DA-41D4-ADC0-A62475056CCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "DB220C58-FEB5-4D00-856A-B8F02089EC69", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "3F256AE5-04EC-4F8E-BBC4-76F16736E275", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "C5878D75-96C7-44AB-8982-705FBC2A7825", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B2FBE3D-3B56-4E56-8156-63FE4F1B8CF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "00B0C7D6-30BF-4ABD-A72C-795D60DC5CC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "DC05EA49-627E-4A40-ABB0-E590623C0B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "47930D99-B18D-4A65-B49E-060B661919E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.4:-:*:*:*:*:*:*", "matchCriteriaId": "6C3B1880-D8EB-40CA-B241-02B3C8B49869", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.8.4:patch:*:*:*:*:*:*", "matchCriteriaId": "E7700F38-C7DD-4F86-B3DE-C3C9A28370A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "C994DA95-D877-4319-911A-90918A9C566F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.9.9-1:*:*:*:*:*:*:*", "matchCriteriaId": "3AB27842-9235-4E3D-9E07-5DC873560D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.9.9-2:*:*:*:*:*:*:*", "matchCriteriaId": "598FBDD0-E019-4AA5-B561-65B4D1BE084A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.9.9-3:*:*:*:*:*:*:*", "matchCriteriaId": "489C42D9-39E2-4491-B318-18A20732ED62", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:1.9.9-4:*:*:*:*:*:*:*", "matchCriteriaId": "0E801BBB-76D3-4873-A431-549FE7DE5451", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "3C287A7F-66B4-406A-B87B-B954A1CA6D44", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "D684FFEF-4451-49ED-A04D-CF74F45A2F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta10_patch:*:*:*:*:*:*", "matchCriteriaId": "D5984B3A-40C9-4188-976C-E9EB166FA624", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta11:*:*:*:*:*:*", "matchCriteriaId": "EDE74B22-31D1-41D1-A5DD-DB4AAA7A7984", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "25DD91AC-465B-4A43-A79F-4DE47243741C", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "115588C7-D947-4576-9E6C-B5AF1FCE9A29", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "BBB20EA3-F3CF-42AF-A217-D5DF7A7ADD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4_patch:*:*:*:*:*:*", "matchCriteriaId": "81A6C732-FBF2-44A8-B810-456E54B59A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "8C5664E5-150E-4B4B-BA0C-420738820FF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5_patch:*:*:*:*:*:*", "matchCriteriaId": "7E764AA1-3060-441F-8F14-ADD165316741", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "04A3E84F-91AA-420A-B908-3393E037AC44", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch:*:*:*:*:*:*", "matchCriteriaId": "828EAE87-24E5-4F31-B301-BA2F96BDEA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch2:*:*:*:*:*:*", "matchCriteriaId": "45710D36-954A-4450-B622-CB0F368DF544", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "2B57EEFB-5518-4BD5-998A-34B6690A6F4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "8EDF4CEE-F24D-441B-92A8-7F5A2B41487E", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8_patch:*:*:*:*:*:*", "matchCriteriaId": "F0275FDF-BAE8-4909-8991-6FCE34B8905E", "vulnerable": true }, { "criteria": "cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "B52F973F-A2F2-40C2-9936-9447B5803CFB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Nginx-UI is a web interface to manage Nginx configurations. The Import Certificate feature allows arbitrary write into the system. The feature does not check if the provided user input is a certification/key and allows to write into arbitrary paths in the system. It\u0027s possible to leverage the vulnerability into a remote code execution overwriting the config file app.ini. Version 2.0.0.beta.12 fixed the issue." }, { "lang": "es", "value": "Nginx-UI es una interfaz web para administrar configuraciones de Nginx. La funci\u00f3n Import Certificate permite la escritura arbitraria en el sistema. La funci\u00f3n no verifica si la entrada del usuario proporcionada es una certificaci\u00f3n/clave y permite escribir en rutas arbitrarias en el sistema. Es posible aprovechar la vulnerabilidad para ejecutar c\u00f3digo remoto sobrescribiendo el archivo de configuraci\u00f3n app.ini. La versi\u00f3n 2.0.0.beta.12 solucion\u00f3 el problema." } ], "id": "CVE-2024-23827", "lastModified": "2024-02-08T16:42:39.110", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2024-01-29T16:15:09.867", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.