Логотип exploitDog
bind:CVE-2023-50094
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-50094

Количество 2

Количество 2

nvd логотип

CVE-2023-50094

около 2 лет назад

reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-vfhc-4q79-wvf9

около 2 лет назад

reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

CVSS3: 8.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-50094

reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

CVSS3: 8.8
92%
Критический
около 2 лет назад
github логотип
GHSA-vfhc-4q79-wvf9

reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

CVSS3: 8.8
92%
Критический
около 2 лет назад

Уязвимостей на страницу