CVE-2022-31137

Severity CVSS v4.0:
Pending analysis
Type:
CWE-78 OS Command Injections
Publication date:
08/07/2022
Last modified:
24/05/2023

Description

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:* 6.1.1.0 (excluding)