CVE-2023-50094
01.01.2024, 18:15
reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
Vendor | Product | Version |
---|---|---|
yogeshojha | rengine | 𝑥 ≤ 2.0.2 |
𝑥
= Vulnerable software versions
References