10
CVSSv2

CVE-2022-31137

Published: 08/07/2022 Updated: 24/05/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions before 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roxy-wi roxy-wi

Vendor Advisories

Check Point Reference: CPAI-2022-1114 Date Published: 23 Jan 2023 Severity: Critical ...

Exploits

Roxy WI version 6100 remote command execution exploit This is a variant of the original disclosure of remote command execution in this version by Nuri Cilengir in April of 2023 ...