CVE-2024-22197
Nginx UI vulnerability analysis and mitigation

Overview

Nginx-ui, a server monitoring tool for CPU usage, memory usage, load average, and disk usage, contains a vulnerability identified as CVE-2024-22197. The vulnerability was discovered in the Home > Preference page functionality where certain nginx settings are exposed. While the UI restricts modification of settings like 'Nginx Access Log Path' and 'Nginx Error Log Path', the API additionally exposes 'test_config_cmd', 'reload_cmd', and 'restart_cmd' which can be modified through direct API requests. The issue was patched in version 2.0.0.beta.9 (GitHub Advisory).

Technical details

The vulnerability stems from insufficient protection of sensitive configuration settings in the API endpoints. While the SaveSettings function is protected by authRequired middleware requiring a valid JWT token or X-Node-Secret, any authenticated user can modify these settings due to lack of proper authorization roles. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) from NIST with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and is classified as CWE-77 (Improper Neutralization of Special Elements used in a Command) (NVD).

Impact

The vulnerability can lead to authenticated Remote Code Execution, Privilege Escalation, and Information Disclosure. When exploited, an authenticated user can modify critical nginx settings through the API, potentially executing arbitrary commands on the system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 2.0.0.beta.9. The fix involves adding protected fields to settings to prevent unauthorized modifications. Users are advised to upgrade to the patched version to mitigate the vulnerability (GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related Nginx UI vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-3738CRITICAL9.8
  • Nginx UINginx UI
  • cpe:2.3:a:nginxui:nginx_ui
NoNoApr 13, 2024
CVE-2024-49368HIGH8.9
  • Nginx UINginx UI
  • cpe:2.3:a:nginxui:nginx_ui
NoYesOct 21, 2024
CVE-2024-23828HIGH8.8
  • Nginx UINginx UI
  • github.com/0xJacky/Nginx-UI
NoYesJan 29, 2024
CVE-2024-49366HIGH7.7
  • Nginx UINginx UI
  • cpe:2.3:a:nginxui:nginx_ui
NoYesOct 21, 2024
CVE-2024-49367MEDIUM5.5
  • Nginx UINginx UI
  • cpe:2.3:a:nginxui:nginx_ui
NoYesOct 21, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management