Логотип exploitDog
bind:CVE-2024-43405
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-43405

Количество 3

Количество 3

nvd логотип

CVE-2024-43405

больше 1 года назад

Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. The vulnerability is present in the template signature verification process, specifically in the `signer` package. The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, combined with the way multiple signatures are processed. This allows an attacker to inject malicious content into a template while maintaining a valid signature for the benign part of the template. CLI users are affected if they execute custom code templates from unverified sources. This includes templates authored by third parties or obtained from unverified repositories. SDK Users are affected if they are developers integrating Nuclei int

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-7h5p-mmpp-hgmm

больше 1 года назад

Nuclei Template Signature Verification Bypass

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2025-00079

больше 1 года назад

Уязвимость обработчика signer-пакетов сканера уязвимостей Nuclei, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-43405

Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. The vulnerability is present in the template signature verification process, specifically in the `signer` package. The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, combined with the way multiple signatures are processed. This allows an attacker to inject malicious content into a template while maintaining a valid signature for the benign part of the template. CLI users are affected if they execute custom code templates from unverified sources. This includes templates authored by third parties or obtained from unverified repositories. SDK Users are affected if they are developers integrating Nuclei int

CVSS3: 7.4
6%
Низкий
больше 1 года назад
github логотип
GHSA-7h5p-mmpp-hgmm

Nuclei Template Signature Verification Bypass

CVSS3: 7.4
6%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-00079

Уязвимость обработчика signer-пакетов сканера уязвимостей Nuclei, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
6%
Низкий
больше 1 года назад

Уязвимостей на страницу