reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
References
Configurations
History
21 Nov 2024, 08:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195 - Product | |
References | () https://github.com/yogeshojha/rengine/releases - Release Notes | |
References | () https://github.com/yogeshojha/rengine/security - Product | |
References | () https://www.mattz.io/posts/cve-2023-50094/ - Exploit, Third Party Advisory |
14 Aug 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output. |
09 Jan 2024, 20:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195 - Product | |
References | () https://github.com/yogeshojha/rengine/security - Product | |
References | () https://github.com/yogeshojha/rengine/releases - Release Notes | |
References | () https://www.mattz.io/posts/cve-2023-50094/ - Exploit, Third Party Advisory | |
First Time |
Yogeshojha rengine
Yogeshojha |
|
CWE | CWE-78 |
01 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-01 18:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50094
Mitre link : CVE-2023-50094
CVE.ORG link : CVE-2023-50094
JSON object : View
Products Affected
yogeshojha
- rengine
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')