9.3 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
53.4%
reNgine through 2.0.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195
github.com/yogeshojha/rengine/releases
github.com/yogeshojha/rengine/security
www.mattz.io/posts/cve-2023-50094/