This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor f5 First view 2020-03-27
Product Nginx Controller Last view 2020-07-02
Version 1.0.1 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
CPE Product cpe:2.3:a:f5:nginx_controller

Activity : Overall

Related : CVE

  Date Alert Description
7.3 2020-07-02 CVE-2020-5911

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.

7.5 2020-07-02 CVE-2020-5910

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.

5.4 2020-07-02 CVE-2020-5909

In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.

9.6 2020-07-01 CVE-2020-5901

In NGINX Controller 3.3.0-3.4.0, undisclosed API endpoints may allow for a reflected Cross Site Scripting (XSS) attack. If the victim user is logged in as admin this could result in a complete compromise of the system.

8.8 2020-07-01 CVE-2020-5900

In versions 3.0.0-3.4.0, 2.0.0-2.9.0, and 1.0.1, there is insufficient cross-site request forgery (CSRF) protections for the NGINX Controller user interface.

7.8 2020-07-01 CVE-2020-5899

In NGINX Controller 3.0.0-3.4.0, recovery code required to change a user's password is transmitted and stored in the database in plain text, which allows an attacker who can intercept the database connection or have read access to the database, to request a password reset using the email address of another registered user then retrieve the recovery code.

7.8 2020-05-07 CVE-2020-5895

On NGINX Controller versions 3.1.0-3.3.0, AVRD uses world-readable and world-writable permissions on its socket, which allows processes or users on the local system to write arbitrary data into the socket. A local system attacker can make AVRD segmentation fault (SIGSEGV) by writing malformed messages to the socket.

8.1 2020-05-07 CVE-2020-5894

On versions 3.0.0-3.3.0, the NGINX Controller webserver does not invalidate the server-side session token after users log out.

8.1 2020-04-23 CVE-2020-5867

In versions prior to 3.3.0, the NGINX Controller Agent installer script '' uses HTTP instead of HTTPS to check and install packages

5.5 2020-04-23 CVE-2020-5866

In versions of NGINX Controller prior to 3.3.0, the script, which is used optionally in NGINX Controller to change settings, uses sensitive items as command-line arguments.

4.8 2020-04-23 CVE-2020-5865

In versions prior to 3.3.0, the NGINX Controller is configured to communicate with its Postgres database server over unencrypted channels, making the communicated data vulnerable to interception via man-in-the-middle (MiTM) attacks.

7.4 2020-04-23 CVE-2020-5864

In versions of NGINX Controller prior to 3.2.0, communication between NGINX Controller and NGINX Plus instances skip TLS verification by default.

8.6 2020-03-27 CVE-2020-5863

In NGINX Controller versions prior to 3.2.0, an unauthenticated attacker with network access to the Controller API can create unprivileged user accounts. The user which is created is only able to upload a new license to the system but cannot view or modify any other components of the system.

CWE : Common Weakness Enumeration

20% (2) CWE-295 Certificate Issues
20% (2) CWE-200 Information Exposure
10% (1) CWE-640 Weak Password Recovery Mechanism for Forgotten Password
10% (1) CWE-384 Session Fixation
10% (1) CWE-352 Cross-Site Request Forgery (CSRF)
10% (1) CWE-287 Improper Authentication
10% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
10% (1) CWE-20 Improper Input Validation