CVE-2023-25802
- Reference to the description:
- Description:
- Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue.
- Last updated date:
- 03/22/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/22/2023
- Reference url to background
https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-qcmp-q5h3-784m