Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pr72-8fxw-xx22

Опубликовано: 19 авг. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Default Credentials in nginx-defender Configuration Files

Impact

This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml, docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections.

Who is impacted? All users who deploy nginx-defender with default credentials and expose the admin interface to untrusted networks.

Patches

The issue is addressed in v1.5.0 and later.

Startup warnings are added if default credentials are detected. Documentation now strongly recommends changing all default passwords before deployment. Patched versions: 1.5.0 and later Will be fully patched in v1.7.0 and later

Workarounds

Users can remediate the vulnerability without upgrading by manually changing all default credentials in configuration files before deployment:

# config.yaml auth: default_password: "your_strong_password_here"
# docker-compose.yml - GF_SECURITY_ADMIN_PASSWORD=your_strong_password

Restrict access to the admin interface and use environment variables for secrets.

References

Пакеты

Наименование

github.com/Anipaleja/nginx-defender

go
Затронутые версииВерсия исправления

< 1.5.0

1.5.0

EPSS

Процентиль: 15%
0.00049
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-1392

Связанные уязвимости

CVSS3: 6.5
nvd
6 месяцев назад

nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files config.yaml and docker-compose.yml contain default credentials (default_password: "change_me_please", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later.

EPSS

Процентиль: 15%
0.00049
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-1392