8.8
CVSSv3

CVE-2023-50094

CVSSv4: NA | CVSSv3: 8.8 | CVSSv2: NA | VMScore: 980 | EPSS: 0.60959 | KEV: Not Included
Published: 01/01/2024 Updated: 21/11/2024

Vulnerability Summary

reNgine prior to 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

Vulnerable Product Search on Vulmon Subscribe to Product

yogeshojha rengine

Github Repositories

poc for CVE-2023-50094 (rengine command injection)

reNgine 220 - Command Injection - CVE-2023-50094 Description This Python script exploits an authenticated command injection vulnerability in reNgine 220 The exploit targets the nmap_cmd parameter in the Scan Engine configuration, allowing attackers to execute arbitrary commands Features User-friendly command-line interface (CLI) Flexible input for base URL, credentials,