First published: Tue Jan 25 2022(Updated: )
On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Controller API Management | >=3.18.0<3.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23008 is rated as a medium severity vulnerability due to the potential for JavaScript injection by authenticated users.
CVE-2022-23008 affects users of NGINX Controller API Management versions 3.18.0 to 3.19.0.
To fix CVE-2022-23008, upgrade to NGINX Controller API Management version 3.19.1 or later.
CVE-2022-23008 exploits undisclosed API endpoints to allow authenticated attackers to inject JavaScript code.
CVE-2022-23008 involves authenticated users with either 'user' or 'admin' roles being able to exploit the vulnerability.