** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-50094. Reason: This candidate is a duplicate of CVE-2023-50094. Notes: All CVE users should reference CVE-2023-50094 instead of this candidate.
References

No reference.

History

Thu, 29 Aug 2024 23:45:00 +0000


Thu, 29 Aug 2024 23:30:00 +0000

Type Values Removed Values Added
Title reNgine authenticated command injection in WAF detection tool

Thu, 29 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
Description reNgine is an automated reconnaissance framework for web applications. In versions 1.2.0 through 2.1.1, an authenticated command injection vulnerability in the WAF detection tool allows an authenticated attacker to remotely execute arbitrary commands as root user. The URL query parameter `url` is passed to `subprocess.check_output` without any sanitization, resulting in a command injection vulnerability. This API endpoint is accessible by authenticated users with any use role. Because the process runs as `root`, an attacker has root access. Commit edd3c85ee16f93804ad38dac5602549d2d30a93e contains a patch for the issue. ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-50094. Reason: This candidate is a duplicate of CVE-2023-50094. Notes: All CVE users should reference CVE-2023-50094 instead of this candidate.

cve-icon MITRE

Status: REJECTED

Assigner: GitHub_M

Published: 2024-07-23T17:22:01.009Z

Updated: 2024-08-29T22:20:26.289Z

Reserved: 2024-07-18T15:21:47.483Z

Link: CVE-2024-41661

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2024-07-23T18:15:06.577

Modified: 2024-08-29T23:15:10.743

Link: CVE-2024-41661

cve-icon Redhat

No data.