Skip to content

Latest commit

 

History

History
12 lines (10 loc) · 1.42 KB

nginxWebUI_runCmd_file_remote_comand_execution_vulnerability.md

File metadata and controls

12 lines (10 loc) · 1.42 KB

nginxWebUI runCmd file remote command execution vulnerability

Vulnerability nginxWebUI runCmd file remote command execution vulnerability
Chinese name nginxWebUI runCmd 文件命令执行漏洞
CVSS core 9.2
FOFA Query (click to view the results directly) title="nginxWebUI" && body="refreshCode('codeImg')"
Number of assets affected 5856
Description NginxWebUI is a tool for graphical management of nginx configuration. You can use web pages to quickly configure various functions of nginx, including http protocol forwarding, tcp protocol forwarding, reverse proxy, load balancing, static html server, automatic application, renewal and configuration of ssl certificates. After configuration, you can create nginx. conf file, and control nginx to use this file to start and reload, completing the graphical control loop of nginx. Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server.
Impact Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server.