|
|||
Rule General Information |
---|
Release Date: | 2024-12-31 | |
Rule Name: | reNgine 2.0.2 Command Injection Vulnerability (CVE-2023-50094) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195 https://github.com/yogeshojha/rengine/releases https://github.com/yogeshojha/rengine/security https://www.mattz.io/posts/cve-2023-50094/ |
|
Solutions |
---|
Please contact the software vendor to update the software patch. |