7.7

CVE-2024-49366

Exploit
Nginx UI is a web user interface for the Nginx web server. Nginx UI v2.0.0-beta.35 and earlier gets the value from the json field without verification, and can construct a value value in the form of `../../`. Arbitrary files can be written to the server, which may result in loss of permissions. Version 2.0.0-beta.26 fixes the issue.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NginxuiNginx Ui Version <= 1.9.9-4
NginxuiNginx Ui Version2.0.0 Updatebeta1
NginxuiNginx Ui Version2.0.0 Updatebeta10
NginxuiNginx Ui Version2.0.0 Updatebeta10_patch
NginxuiNginx Ui Version2.0.0 Updatebeta11
NginxuiNginx Ui Version2.0.0 Updatebeta12
NginxuiNginx Ui Version2.0.0 Updatebeta13
NginxuiNginx Ui Version2.0.0 Updatebeta13-patch
NginxuiNginx Ui Version2.0.0 Updatebeta14
NginxuiNginx Ui Version2.0.0 Updatebeta15
NginxuiNginx Ui Version2.0.0 Updatebeta16
NginxuiNginx Ui Version2.0.0 Updatebeta17
NginxuiNginx Ui Version2.0.0 Updatebeta18
NginxuiNginx Ui Version2.0.0 Updatebeta18-patch1
NginxuiNginx Ui Version2.0.0 Updatebeta18-patch2
NginxuiNginx Ui Version2.0.0 Updatebeta19
NginxuiNginx Ui Version2.0.0 Updatebeta2
NginxuiNginx Ui Version2.0.0 Updatebeta20
NginxuiNginx Ui Version2.0.0 Updatebeta21
NginxuiNginx Ui Version2.0.0 Updatebeta22
NginxuiNginx Ui Version2.0.0 Updatebeta23
NginxuiNginx Ui Version2.0.0 Updatebeta23-patch1
NginxuiNginx Ui Version2.0.0 Updatebeta23-ptach2
NginxuiNginx Ui Version2.0.0 Updatebeta24
NginxuiNginx Ui Version2.0.0 Updatebeta25
NginxuiNginx Ui Version2.0.0 Updatebeta25-patch1
NginxuiNginx Ui Version2.0.0 Updatebeta25-ptach2
NginxuiNginx Ui Version2.0.0 Updatebeta27
NginxuiNginx Ui Version2.0.0 Updatebeta28
NginxuiNginx Ui Version2.0.0 Updatebeta29
NginxuiNginx Ui Version2.0.0 Updatebeta3
NginxuiNginx Ui Version2.0.0 Updatebeta30
NginxuiNginx Ui Version2.0.0 Updatebeta31
NginxuiNginx Ui Version2.0.0 Updatebeta32
NginxuiNginx Ui Version2.0.0 Updatebeta32-patch1
NginxuiNginx Ui Version2.0.0 Updatebeta33
NginxuiNginx Ui Version2.0.0 Updatebeta34
NginxuiNginx Ui Version2.0.0 Updatebeta35
NginxuiNginx Ui Version2.0.0 Updatebeta4
NginxuiNginx Ui Version2.0.0 Updatebeta4_patch
NginxuiNginx Ui Version2.0.0 Updatebeta5
NginxuiNginx Ui Version2.0.0 Updatebeta5_patch
NginxuiNginx Ui Version2.0.0 Updatebeta6
NginxuiNginx Ui Version2.0.0 Updatebeta6_patch
NginxuiNginx Ui Version2.0.0 Updatebeta6_patch2
NginxuiNginx Ui Version2.0.0 Updatebeta7
NginxuiNginx Ui Version2.0.0 Updatebeta8
NginxuiNginx Ui Version2.0.0 Updatebeta8_patch
NginxuiNginx Ui Version2.0.0 Updatebeta9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.52% 0.665
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
security-advisories@github.com 7.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.