Lucene search

K
cve[email protected]CVE-2024-3739
HistoryApr 13, 2024 - 7:15 p.m.

CVE-2024-3739

2024-04-1319:15:53
CWE-78
web.nvd.nist.gov
29
vulnerability
cym1102
nginxwebui
command injection
remote attack
public disclosure
vdb-260578
cve-2024-3739

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.6 High

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0005 Low

EPSS

Percentile

16.3%

A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability.

Affected configurations

Vulners
Node
cym1102nginxwebuiMatch3.9.0
OR
cym1102nginxwebuiMatch3.9.1
OR
cym1102nginxwebuiMatch3.9.2
OR
cym1102nginxwebuiMatch3.9.3
OR
cym1102nginxwebuiMatch3.9.4
OR
cym1102nginxwebuiMatch3.9.5
OR
cym1102nginxwebuiMatch3.9.6
OR
cym1102nginxwebuiMatch3.9.7
OR
cym1102nginxwebuiMatch3.9.8
OR
cym1102nginxwebuiMatch3.9.9

CNA Affected

[
  {
    "vendor": "cym1102",
    "product": "nginxWebUI",
    "versions": [
      {
        "version": "3.9.0",
        "status": "affected"
      },
      {
        "version": "3.9.1",
        "status": "affected"
      },
      {
        "version": "3.9.2",
        "status": "affected"
      },
      {
        "version": "3.9.3",
        "status": "affected"
      },
      {
        "version": "3.9.4",
        "status": "affected"
      },
      {
        "version": "3.9.5",
        "status": "affected"
      },
      {
        "version": "3.9.6",
        "status": "affected"
      },
      {
        "version": "3.9.7",
        "status": "affected"
      },
      {
        "version": "3.9.8",
        "status": "affected"
      },
      {
        "version": "3.9.9",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.6 High

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0005 Low

EPSS

Percentile

16.3%

Related for CVE-2024-3739