CVE-2023-50094
HIGH NUCLEIYogeshojha Rengine < 2.0.2 - OS Command Injection
Title source: ruleDescription
reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
Exploits (1)
Nuclei Templates (1)
reNgine 2.2.0 - Command Injection
HIGHby Zierax
Shodan:
title:"reNgine"
References (8)
Scores
CVSS v3
8.8
EPSS
0.8856
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
yogeshojha/rengine
< 2.0.2
Published
Jan 01, 2024
Tracked Since
Feb 18, 2026