NA

CVE-2022-31161

Published: 15/07/2022 Updated: 03/04/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

roxy-wi roxy-wi

Vendor Advisories

Check Point Reference: CPAI-2022-1114 Date Published: 23 Jan 2023 Severity: Critical ...

Exploits

Roxy WI version 6110 suffers from an unauthenticated remote code execution vulnerability ...