Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). This issue has been addressed in version 3.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Projectdiscovery
Projectdiscovery nuclei |
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-17T17:34:10.792Z
Updated: 2024-08-13T20:55:48.064Z
Reserved: 2024-07-08T16:13:15.512Z
Link: CVE-2024-40641
Vulnrichment
Updated: 2024-08-02T04:33:11.961Z
NVD
Status : Awaiting Analysis
Published: 2024-07-17T18:15:05.020
Modified: 2024-11-21T09:31:24.887
Link: CVE-2024-40641
Redhat
No data.