Nginx-UI is an online statistics for Server Indicators Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `"desc"` and `"id"` values are used as default values if the query parameters are not set. Thus, the `order` and `sort_by` query parameter are user-controlled and are being appended to the `order` variable without any sanitization. This issue has been patched in version 2.0.0.beta.9.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
References | () https://github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b - Patch | |
References | () https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c - Exploit, Vendor Advisory |
29 Feb 2024, 01:44
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Nginx-UI is an online statistics for Server Indicators Monitor CPU usage, memory usage, load average, and disk usage in real-time. This issue may lead to information disclosure. By using `DefaultQuery`, the `"desc"` and `"id"` values are used as default values if the query parameters are not set. Thus, the `order` and `sort_by` query parameter are user-controlled and are being appended to the `order` variable without any sanitization. This issue has been patched in version 2.0.0.beta.9. |
18 Jan 2024, 19:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b - Patch | |
References | () https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h374-mm57-879c - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:nginxui:nginx_ui:*:*:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta7:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch2:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5_patch:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8_patch:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4_patch:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta5:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6_patch:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta8:*:*:*:*:*:* cpe:2.3:a:nginxui:nginx_ui:2.0.0:beta6:*:*:*:*:*:* |
|
First Time |
Nginxui nginx Ui
Nginxui |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
11 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 20:15
Updated : 2024-11-21 08:55
NVD link : CVE-2024-22196
Mitre link : CVE-2024-22196
CVE.ORG link : CVE-2024-22196
JSON object : View
Products Affected
nginxui
- nginx_ui
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')