CVE-2023-50094

HIGH NUCLEI

Yogeshojha Rengine < 2.0.2 - OS Command Injection

Title source: rule

Description

reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.

Exploits (1)

nomisec WORKING POC
by Zierax · poc
https://github.com/Zierax/CVE-2023-50094_POC

Nuclei Templates (1)

reNgine 2.2.0 - Command Injection
HIGHby Zierax
Shodan: title:"reNgine"

Scores

CVSS v3 8.8
EPSS 0.8856
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
yogeshojha/rengine < 2.0.2
Published Jan 01, 2024
Tracked Since Feb 18, 2026