Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). This issue has been addressed in version 3.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2317 | Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). This issue has been addressed in version 3.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-c3q9-c27p-cw9h | projectdiscovery/nuclei allows unsigned code template execution through workflows |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 13 Aug 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Projectdiscovery
Projectdiscovery nuclei |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-13T20:55:48.064Z
Reserved: 2024-07-08T16:13:15.512Z
Link: CVE-2024-40641
Updated: 2024-08-02T04:33:11.961Z
Status : Awaiting Analysis
Published: 2024-07-17T18:15:05.020
Modified: 2024-11-21T09:31:24.887
Link: CVE-2024-40641
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:06:54Z
EUVD
Github GHSA