reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
References
Link | Resource |
---|---|
https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195 | Product |
https://github.com/yogeshojha/rengine/releases | Release Notes |
https://github.com/yogeshojha/rengine/security | Product |
https://www.mattz.io/posts/cve-2023-50094/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2024-01-01T00:00:00
Updated: 2024-01-01T17:58:51.819166
Reserved: 2023-12-04T00:00:00
Link: CVE-2023-50094
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-01T18:15:09.130
Modified: 2024-01-09T20:48:00.660
Link: CVE-2023-50094
JSON object: View
Redhat Information
No data.
CWE