reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
References
Configurations
History
No history.
Information
Published : 2024-01-01 18:15
Updated : 2025-04-17 19:15
NVD link : CVE-2023-50094
Mitre link : CVE-2023-50094
CVE.ORG link : CVE-2023-50094
JSON object : View
Products Affected
yogeshojha
- rengine
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')