CVE-2022-23008

On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
References
Link Resource
https://support.f5.com/csp/article/K57735782 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:f5:nginx_controller_api_management:*:*:*:*:*:*:*:*

History

27 Jun 2023, 19:02

Type Values Removed Values Added
CWE CWE-94 CWE-79
CVSS v2 : 5.5
v3 : 8.1
v2 : 5.5
v3 : 5.4

Information

Published : 2022-01-25 20:15

Updated : 2024-02-28 18:48


NVD link : CVE-2022-23008

Mitre link : CVE-2022-23008

CVE.ORG link : CVE-2022-23008


JSON object : View

Products Affected

f5

  • nginx_controller_api_management
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')