Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-49367— Nginx UI's log path can be controlled

EPSS 0.58% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-49367

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Nginx UI's log path can be controlled
Source: NVD (National Vulnerability Database)
Vulnerability Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.0.0-beta.36, the log path of nginxui is controllable. This issue can be combined with the directory traversal at `/api/configs` to read directories and file contents on the server. Version 2.0.0-beta.36 fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Nginx UI 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Nginx UI是Jacky个人开发者的一个 Nginx 的 WebUI。 Nginx UI 2.0.0-beta.36之前版本存在安全漏洞,该漏洞源于其日志路径是可控的,导致攻击者可以结合/api/configs处的目录遍历来读取服务器上的目录和文件内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
0xJackynginx-ui < 2.0.0-beta.36 -

II. Public POCs for CVE-2024-49367

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-49367

登录查看更多情报信息。

Same Patch Batch · 0xJacky · 2024-10-21 · 3 CVEs total

CVE-2024-49366Nginx UI's json field can construct a directory traversal payload, causing arbitrary files
CVE-2024-49368Unchecked logrotate settings lead to arbitrary command execution

IV. Related Vulnerabilities

V. Comments for CVE-2024-49367

No comments yet


Leave a comment