** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-50094. Reason: This candidate is a duplicate of CVE-2023-50094. Notes: All CVE users should reference CVE-2023-50094 instead of this candidate.
Metrics
Affected Vendors & Products
References
No reference.
History
Thu, 29 Aug 2024 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV3_1
|
Thu, 29 Aug 2024 23:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | reNgine authenticated command injection in WAF detection tool |
Thu, 29 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | reNgine is an automated reconnaissance framework for web applications. In versions 1.2.0 through 2.1.1, an authenticated command injection vulnerability in the WAF detection tool allows an authenticated attacker to remotely execute arbitrary commands as root user. The URL query parameter `url` is passed to `subprocess.check_output` without any sanitization, resulting in a command injection vulnerability. This API endpoint is accessible by authenticated users with any use role. Because the process runs as `root`, an attacker has root access. Commit edd3c85ee16f93804ad38dac5602549d2d30a93e contains a patch for the issue. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-50094. Reason: This candidate is a duplicate of CVE-2023-50094. Notes: All CVE users should reference CVE-2023-50094 instead of this candidate. |
MITRE
Status: REJECTED
Assigner: GitHub_M
Published: 2024-07-23T17:22:01.009Z
Updated: 2024-08-29T22:20:26.289Z
Reserved: 2024-07-18T15:21:47.483Z
Link: CVE-2024-41661
Vulnrichment
Updated:
NVD
Status : Rejected
Published: 2024-07-23T18:15:06.577
Modified: 2024-08-29T23:15:10.743
Link: CVE-2024-41661
Redhat
No data.