|
|||
Rule General Information |
---|
Release Date: | 2024-11-19 | |
Rule Name: | Ngnix UI Arbitrary Command Execution Vulnerability (CVE-2024-49368) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, when Nginx UI configures logrotate, it does not verify the input and directly passes it to exec.Command, causing arbitrary command execution. Version 2.0.0-beta.36 fixes this issue. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36 https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-66m6-27r9-77vm |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36 |