ID CVE-2018-19991
Summary VeryNginx 0.3.3 allows remote attackers to bypass the Web Application Firewall feature because there is no error handler (for get_uri_args or get_post_args) to block the API misuse described in CVE-2018-9230.
References
Vulnerable Configurations
  • cpe:2.3:a:verynginx_project:verynginx:0.3.3:*:*:*:*:nginx:*:*
    cpe:2.3:a:verynginx_project:verynginx:0.3.3:*:*:*:*:nginx:*:*
CVSS
Base: 7.5 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE CWE-755
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
misc https://github.com/alexazhou/VeryNginx/issues/218
Last major update 24-08-2020 - 17:37
Published 10-12-2018 - 00:29
Last modified 24-08-2020 - 17:37
Back to Top