Lucene search

K
cvelistVulDBCVELIST:CVE-2024-3739
HistoryApr 13, 2024 - 6:31 p.m.

CVE-2024-3739 cym1102 nginxWebUI upload os command injection

2024-04-1318:31:05
CWE-78
VulDB
www.cve.org
cym1102
nginxwebui
remote
os command injection
cve-2024-3739

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.3 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0005 Low

EPSS

Percentile

16.3%

A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability.

CNA Affected

[
  {
    "vendor": "cym1102",
    "product": "nginxWebUI",
    "versions": [
      {
        "version": "3.9.0",
        "status": "affected"
      },
      {
        "version": "3.9.1",
        "status": "affected"
      },
      {
        "version": "3.9.2",
        "status": "affected"
      },
      {
        "version": "3.9.3",
        "status": "affected"
      },
      {
        "version": "3.9.4",
        "status": "affected"
      },
      {
        "version": "3.9.5",
        "status": "affected"
      },
      {
        "version": "3.9.6",
        "status": "affected"
      },
      {
        "version": "3.9.7",
        "status": "affected"
      },
      {
        "version": "3.9.8",
        "status": "affected"
      },
      {
        "version": "3.9.9",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.3 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.0005 Low

EPSS

Percentile

16.3%

Related for CVELIST:CVE-2024-3739