Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-43405

Опубликовано: 04 сент. 2024
Источник: nvd
CVSS3: 7.4
CVSS3: 7.8
EPSS Низкий

Описание

Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. The vulnerability is present in the template signature verification process, specifically in the signer package. The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, combined with the way multiple signatures are processed. This allows an attacker to inject malicious content into a template while maintaining a valid signature for the benign part of the template. CLI users are affected if they execute custom code templates from unverified sources. This includes templates authored by third parties or obtained from unverified repositories. SDK Users are affected if they are developers integrating Nuclei int

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:projectdiscovery:nuclei:*:*:*:*:*:go:*:*
Версия от 3.0.0 (включая) до 3.3.2 (исключая)

EPSS

Процентиль: 91%
0.06056
Низкий

7.4 High

CVSS3

7.8 High

CVSS3

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 7.4
github
больше 1 года назад

Nuclei Template Signature Verification Bypass

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость обработчика signer-пакетов сканера уязвимостей Nuclei, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 91%
0.06056
Низкий

7.4 High

CVSS3

7.8 High

CVSS3

Дефекты

CWE-78
CWE-78