
Cloud Vulnerability DB
A community-led vulnerabilities database
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection (CVE-2020-7621). The vulnerability allows execution of arbitrary commands as part of the '_nginxCmd()' function. This vulnerability was disclosed on April 2, 2020 (Snyk).
The vulnerability exists in the _nginxCmd() function where the first argument can be controlled by users without any sanitization. This allows attackers to inject arbitrary system commands that will be executed by the application. The vulnerability has been assigned a CVSS v3.1 score of 6.5 (Medium) by Snyk, though other sources rate it higher (Snyk).
A successful exploitation of this vulnerability could allow attackers to execute arbitrary commands on the affected system, potentially leading to complete system compromise. The vulnerability affects the confidentiality of the system with potential for high impact, while having a lower impact on system integrity (Snyk).
There is no fixed version available for strong-nginx-controller. Users of this package should consider using alternative solutions or implementing additional security controls to prevent command injection attacks (Snyk).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."