CVE-2020-5900
- EPSS 0.28%
- Veröffentlicht 01.07.2020 14:15:14
- Zuletzt bearbeitet 21.11.2024 05:34:47
In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.
CVE-2020-5895
- EPSS 0.06%
- Veröffentlicht 07.05.2020 13:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:47
On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmen...
CVE-2020-5894
- EPSS 0.42%
- Veröffentlicht 07.05.2020 13:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:46
On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
CVE-2020-5867
- EPSS 0.15%
- Veröffentlicht 23.04.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:43
In versions prior to 3.3.0, the NGINX Controller Agent installer script 'install.sh' uses HTTP instead of HTTPS to check and install packages
CVE-2020-5866
- EPSS 0.1%
- Veröffentlicht 23.04.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:43
In versions of NGINX Controller prior to 3.3.0, the helper.sh script, which is used optionally in NGINX Controller to change settings, uses sensitive items as command-line arguments.
CVE-2020-5865
- EPSS 0.12%
- Veröffentlicht 23.04.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:34:43
In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.
CVE-2020-5864
- EPSS 0.42%
- Veröffentlicht 23.04.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:43
In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.
CVE-2020-5863
- EPSS 1.11%
- Veröffentlicht 27.03.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:34:43
In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or ...