F5 NGINX Controller 3.2.0

CPE Details

F5 NGINX Controller 3.2.0
3.2.0
2020-03-30
11h48 +00:00
2020-03-30
11h48 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:f5:nginx_controller:3.2.0:*:*:*:*:*:*:*

Informations

Vendor

f5

Product

nginx_controller

Version

3.2.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-23021 2021-06-01 10h23 +00:00 The Nginx Controller 3.x before 3.7.0 agent configuration file /etc/controller-agent/agent.conf is world readable with current permission bits set to 644.
5.5
Moyen
CVE-2021-23020 2021-06-01 10h14 +00:00 The NAAS 3.x before 3.10.0 API keys were generated using an insecure pseudo-random string and hashing algorithm which could lead to predictable keys.
5.5
Moyen
CVE-2021-23019 2021-06-01 10h03 +00:00 The NGINX Controller 2.0.0 thru 2.9.0 and 3.x before 3.15.0 Administrator password may be exposed in the systemd.txt file that is included in the NGINX support package.
7.8
Haute
CVE-2021-23018 2021-06-01 09h51 +00:00 Intra-cluster communication does not use TLS. The services within the NGINX Controller 3.x before 3.4.0 namespace are using cleartext protocols inside the cluster.
7.4
Haute
CVE-2020-27730 2020-12-11 18h03 +00:00 In versions 3.0.0-3.9.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller Agent does not use absolute paths when calling system utilities.
9.8
Critique
CVE-2020-5909 2020-07-02 10h26 +00:00 In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
5.4
Moyen
CVE-2020-5910 2020-07-02 10h25 +00:00 In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
7.5
Haute
CVE-2020-5911 2020-07-02 10h23 +00:00 In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.
7.3
Haute
CVE-2020-5899 2020-07-01 12h01 +00:00 In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.
7.8
Haute
CVE-2020-5900 2020-07-01 11h59 +00:00 In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.
8.8
Haute
CVE-2020-5895 2020-05-07 10h28 +00:00 On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket.
7.8
Haute
CVE-2020-5894 2020-05-07 10h25 +00:00 On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.
8.1
Haute
CVE-2020-5867 2020-04-23 17h58 +00:00 In versions prior to 3.3.0, the NGINX Controller Agent installer script 'install.sh' uses HTTP instead of HTTPS to check and install packages
8.1
Haute
CVE-2020-5866 2020-04-23 16h37 +00:00 In versions of NGINX Controller prior to 3.3.0, the helper.sh script, which is used optionally in NGINX Controller to change settings, uses sensitive items as command-line arguments.
5.5
Moyen
CVE-2020-5864 2020-04-23 16h32 +00:00 In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.
7.4
Haute
CVE-2020-5865 2020-04-23 16h16 +00:00 In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.
4.8
Moyen