reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities. A vulnerability has been identified in reconftw where inadequate validation of retrieved subdomains may lead to a Remote Code Execution (RCE) attack. An attacker can exploit this vulnerability by crafting a malicious CSP entry on it's own domain. Successful exploitation can lead to the execution of arbitrary code within the context of the application, potentially compromising the system. This issue has been addressed in version 2.7.1.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/six2dez/reconftw/commit/e639de356c0880fe5fe01a32de9d0c58afb5f086 - Patch | |
References | () https://github.com/six2dez/reconftw/security/advisories/GHSA-fxwr-vr9x-wvjp - Vendor Advisory |
28 Oct 2023, 03:48
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/six2dez/reconftw/commit/e639de356c0880fe5fe01a32de9d0c58afb5f086 - Patch | |
References | (MISC) https://github.com/six2dez/reconftw/security/advisories/GHSA-fxwr-vr9x-wvjp - Vendor Advisory | |
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:six2dez:reconftw:*:*:*:*:*:*:*:* | |
First Time |
Six2dez
Six2dez reconftw |
20 Oct 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-20 19:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-46117
Mitre link : CVE-2023-46117
CVE.ORG link : CVE-2023-46117
JSON object : View
Products Affected
six2dez
- reconftw
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')