RULE(RULE ID:338626)

Rule General Information
Release Date: 2024-12-31
Rule Name: reNgine 2.0.2 Command Injection Vulnerability (CVE-2023-50094)
Severity:
CVE ID:
Rule Protection Details
Description: reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195
https://github.com/yogeshojha/rengine/releases
https://github.com/yogeshojha/rengine/security
https://www.mattz.io/posts/cve-2023-50094/
Solutions
Please contact the software vendor to update the software patch.