Yes, if you are running nextcloud or owncloud, here the command to use to update your Nginx configuration :
# for the location /
sed -i 's/rewrite ^ \/index.php$request_uri;/rewrite ^ \/index.php;/g' path/to/your/conf
# for the block location ~ ^\/(?:index|remote|public|cron|core\/ajax\/update|status
sed -i 's/include fastcgi_params;/try_files $fastcgi_script_name \=404;\n include fastcgi_params;/g' path/to/your/conf
Current WordOps Nginx configurations are not vulnerable to this CVE.