Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Unauthenticated Remote Code Execution via Backup Restore in nginx-ui
Vulnerability Description
Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx-ui exposes a backup restore endpoint (POST /api/restore) that is completely unauthenticated during the first 10 minutes after process startup on any fresh installation. An unauthenticated remote attacker can upload a crafted backup archive that overwrites the application's configuration file (app.ini) and SQLite database. Because the attacker controls the restored app.ini, they can inject an arbitrary OS command into the TestConfigCmd setting. After the application automatically restarts to apply the restored config, a single follow-up request triggers that command as the user running nginx-ui — typically root in Docker deployments. This issue has been patched in version 2.3.8.
CVSS Information
N/A
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Nginx UI 代码注入漏洞
Vulnerability Description
Nginx UI是Jacky个人开发者的一个 Nginx 的 WebUI。 Nginx UI 2.3.8之前版本存在代码注入漏洞,该漏洞源于备份恢复端点POST /api/restore在进程启动后前10分钟内完全未经身份验证,可能导致未经身份验证的远程攻击者上传特制备份存档覆盖配置文件app.ini和SQLite数据库,注入任意OS命令至TestConfigCmd设置,并在应用自动重启后触发命令执行。
CVSS Information
N/A
Vulnerability Type
N/A