CVE-2024-49366
Description
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
CWE
- CWE-22 — CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Affected
- 0xJacky / nginx-ui — v=< 2.0.0-beta.36 [affected]
CVSS
- 4.0 score=7.7 severity=HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
References
- https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-prv4-rx44-f7jr x_refsource_CONFIRM
- https://github.com/0xJacky/nginx-ui/releases/tag/v2.0.0-beta.36 x_refsource_MISC
Source
cvelistV5-main/cves/2024/49xxx/CVE-2024-49366.json