Skip to content

Access Control: nginxWebUI ≤ 3.5.0 - Remote Command Execution

Identifier: nginx_webui_rce

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

There is a command execution vulnerability in the nginxWebUI backend. After logging in to the backend, the attacker can execute any command to obtain server permissions.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  nginx_webui_rce:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.