Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Roxy-wi Subscribe
Filtered by product Roxy-wi
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-25803 1 Roxy-wi 1 Roxy-wi 2023-03-22 N/A 7.5 HIGH
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0.
CVE-2023-25802 1 Roxy-wi 1 Roxy-wi 2023-03-22 N/A 7.5 HIGH
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue.
CVE-2023-25804 1 Roxy-wi 1 Roxy-wi 2023-03-18 N/A 5.3 MEDIUM
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test111_dev`. This issue has been fixed in version 6.3.5.0.
CVE-2022-31137 1 Roxy-wi 1 Roxy-wi 2022-11-04 10.0 HIGH 9.8 CRITICAL
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2022-31161 1 Roxy-wi 1 Roxy-wi 2022-07-22 N/A 9.8 CRITICAL
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.
CVE-2022-31126 1 Roxy-wi 1 Roxy-wi 2022-07-14 7.5 HIGH 9.8 CRITICAL
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-wi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CVE-2022-31125 1 Roxy-wi 1 Roxy-wi 2022-07-14 7.5 HIGH 9.8 CRITICAL
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially crafted HTTP request. This affects Roxywi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CVE-2021-38167 1 Roxy-wi 1 Roxy-wi 2021-08-13 7.5 HIGH 9.8 CRITICAL
Roxy-WI through 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication.
CVE-2021-38169 1 Roxy-wi 1 Roxy-wi 2021-08-13 6.5 MEDIUM 8.8 HIGH
Roxy-WI through 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.
CVE-2021-38168 1 Roxy-wi 1 Roxy-wi 2021-08-12 6.5 MEDIUM 8.8 HIGH
Roxy-WI through 5.2.2.0 allows authenticated SQL injection via select_servers.