A vulnerability classified as critical has been found in cym1102 nginxWebUI up to 3.9.9. This affects the function handlePath of the file /adminPage/conf/saveCmd. The manipulation of the argument nginxPath leads to improper certificate validation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260577 was assigned to this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/cym1102/nginxWebUI/files/14818455/nginxwebui.rce.3.9.9.pdf | Exploit |
| https://github.com/cym1102/nginxWebUI/issues/138 | Issue Tracking |
| https://vuldb.com/?ctiid.260577 | Permissions Required VDB Entry |
| https://vuldb.com/?id.260577 | Third Party Advisory VDB Entry |
| https://github.com/cym1102/nginxWebUI/files/14818455/nginxwebui.rce.3.9.9.pdf | Exploit |
| https://github.com/cym1102/nginxWebUI/issues/138 | Issue Tracking |
| https://vuldb.com/?ctiid.260577 | Permissions Required VDB Entry |
| https://vuldb.com/?id.260577 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2024-04-13 18:15
Updated : 2025-08-21 00:52
NVD link : CVE-2024-3738
Mitre link : CVE-2024-3738
CVE.ORG link : CVE-2024-3738
JSON object : View
Products Affected
cym1102
- nginxwebui
CWE
CWE-295
Improper Certificate Validation
