Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). This issue has been addressed in version 3.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Tue, 13 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:projectdiscovery:nuclei:3.0.0:*:*:*:*:*:*:*
Vendors & Products Projectdiscovery
Projectdiscovery nuclei
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-17T17:34:10.792Z

Updated: 2024-08-13T20:55:48.064Z

Reserved: 2024-07-08T16:13:15.512Z

Link: CVE-2024-40641

cve-icon Vulnrichment

Updated: 2024-08-02T04:33:11.961Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-17T18:15:05.020

Modified: 2024-07-18T12:28:43.707

Link: CVE-2024-40641

cve-icon Redhat

No data.