Lucene search

K
cve[email protected]CVE-2024-3740
HistoryApr 13, 2024 - 9:15 p.m.

CVE-2024-3740

2024-04-1321:15:48
CWE-502
web.nvd.nist.gov
32
vulnerability
cym1102 nginxwebui
remote deserialization

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

15.5%

A vulnerability, which was classified as critical, has been found in cym1102 nginxWebUI up to 3.9.9. This issue affects the function exec of the file /adminPage/conf/reload. The manipulation of the argument nginxExe leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-260579.

Affected configurations

Vulners
Node
cym1102nginxwebuiMatch3.9.0
OR
cym1102nginxwebuiMatch3.9.1
OR
cym1102nginxwebuiMatch3.9.2
OR
cym1102nginxwebuiMatch3.9.3
OR
cym1102nginxwebuiMatch3.9.4
OR
cym1102nginxwebuiMatch3.9.5
OR
cym1102nginxwebuiMatch3.9.6
OR
cym1102nginxwebuiMatch3.9.7
OR
cym1102nginxwebuiMatch3.9.8
OR
cym1102nginxwebuiMatch3.9.9

CNA Affected

[
  {
    "vendor": "cym1102",
    "product": "nginxWebUI",
    "versions": [
      {
        "version": "3.9.0",
        "status": "affected"
      },
      {
        "version": "3.9.1",
        "status": "affected"
      },
      {
        "version": "3.9.2",
        "status": "affected"
      },
      {
        "version": "3.9.3",
        "status": "affected"
      },
      {
        "version": "3.9.4",
        "status": "affected"
      },
      {
        "version": "3.9.5",
        "status": "affected"
      },
      {
        "version": "3.9.6",
        "status": "affected"
      },
      {
        "version": "3.9.7",
        "status": "affected"
      },
      {
        "version": "3.9.8",
        "status": "affected"
      },
      {
        "version": "3.9.9",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.8 Medium

AI Score

Confidence

Low

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

15.5%

Related for CVE-2024-3740