CVE-2023-50094

reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-01 18:15

Updated : 2025-04-17 19:15


NVD link : CVE-2023-50094

Mitre link : CVE-2023-50094

CVE.ORG link : CVE-2023-50094


JSON object : View

Products Affected

yogeshojha

  • rengine
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')