Vulnerability | nginxWebUI runCmd file remote command execution vulnerability |
---|---|
Chinese name | nginxWebUI runCmd 文件命令执行漏洞 |
CVSS core | 9.2 |
FOFA Query (click to view the results directly) | title="nginxWebUI" && body="refreshCode('codeImg')" |
Number of assets affected | 5856 |
Description | NginxWebUI is a tool for graphical management of nginx configuration. You can use web pages to quickly configure various functions of nginx, including http protocol forwarding, tcp protocol forwarding, reverse proxy, load balancing, static html server, automatic application, renewal and configuration of ssl certificates. After configuration, you can create nginx. conf file, and control nginx to use this file to start and reload, completing the graphical control loop of nginx. Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. |
Impact | Attackers can use this vulnerability to arbitrarily execute code on the server side, write backdoors, obtain server permissions, and then control the entire web server. |