Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 17 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output. | reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output. |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-17T18:55:32.440Z
Reserved: 2023-12-04T00:00:00.000Z
Link: CVE-2023-50094
Updated: 2024-08-02T22:09:49.629Z
Status : Modified
Published: 2024-01-01T18:15:09.130
Modified: 2025-04-17T19:15:57.367
Link: CVE-2023-50094
No data.
OpenCVE Enrichment
No data.