Categories: Cyber Security News

Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup

A newly discovered critical vulnerability in Nginx UI allows unauthenticated attackers to download and decrypt full system backups.

Tracked as CVE-2026-27944, this flaw is categorized as CWE-306 and CWE-311, carrying a maximum CVSS score of 9.8.

It affects all versions of the Nginx UI before 2.3.2, requiring administrators to apply the security patch by upgrading to 2.3.3.

Sponsored

The vulnerability stems from two major security failures in the Nginx UI Go codebase.

The /api/backup endpoint lacks authentication checks, leaving it fully exposed to the public internet, unlike other protected management endpoints.

Furthermore, the system mistakenly sends the Base64-encoded AES-256 encryption key and Initialization Vector (IV) in plain text within the X-Backup-Security HTTP response header.

An attacker sends a standard GET request to the backup endpoint, downloads the encrypted ZIP archives, and uses the keys provided in the request header to unlock their contents instantly.

A public Proof-of-Concept (PoC) script is already available, demonstrating how easily this flaw can be exploited with Python to extract the targeted files.

Once the backup is decrypted, the attacker gains access to highly sensitive system files, including the database.db file containing user credentials and the app.ini configuration file.

Through this exploit, all SSL certificates, private keys, Nginx configuration files, and virtual host setups are fully exposed to the attacker.

With this information, threat actors can effortlessly take over the Nginx UI management console or intercept secure communications via man-in-the-middle attacks.

Sponsored

The stolen credentials and session tokens can also be weaponized to pivot into deeper network intrusions.

Mitigations

Regarding mitigation and response, upgrading the Nginx UI to version 2.3.3 or later is the immediate, most critical action.

According to GitHub’s advisory, organizations should also enforce strict access control by restricting network access to the /api/backup endpoint using firewalls.

Until the patch can be applied, security teams should block public access to the /api/backup endpoint and restrict all management interfaces to trusted internal networks only.​

For proactive detection purposes, security teams must monitor server logs for unexpected or unauthenticated GET /api/backup HTTP requests.

Additionally, to check for direct exposure, administrators should continuously inspect outgoing HTTP responses for the presence of the X-Backup-Security header containing the leaked Base64 keys.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

One of Grammarly’s ‘experts’ is suing the company over its identity-stealing AI feature

Journalist Julia Angwin is one of the writers whose likeness was used in Grammarly’s “expert…

2 hours ago

Trump administration asks Supreme Court to revoke legal protections for Haitians

The U.S. Supreme Court on Oct. 9, 2024. (Photo by Jane Norman/States Newsroom)WASHINGTON — The…

3 hours ago

iPhone Fold rumor: iPad-like multitasking, but no iPad apps and no Face ID

The folding iPhone might come with an inner display the size of an iPad Mini,…

3 hours ago

Some of the best horror games ever made are included in Humble’s latest $15 bundle

Humble has teamed up with Frictional Games for a new bundle of PC games that…

3 hours ago

The EasySMX S10 Gamepad Has All the Features of the Nintendo Switch 2 Pro for Less Than Half the Price

Looking for a Nintendo Switch 2 gamepad that has the same functionality as the Switch…

3 hours ago

1080p at 30fps – Valve Finally Details Steam Machine’s Verified Program

While we continue to wait for Valve to launch the Steam Machine amidst painful hardware…

3 hours ago

This website uses cookies.