Remote Code Execution Vulnerability in Roxy-WI (Versions prior to 6.1.1.0)

Remote Code Execution Vulnerability in Roxy-WI (Versions prior to 6.1.1.0)

CVE-2022-31137 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Learn more about our Cis Benchmark Audit For Apache Http Server.