7.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.0005 Low
EPSS
Percentile
17.1%
A significant security oversight was identified in Nuclei v3, involving the execution of unsigned code templates through workflows. This vulnerability specifically affects users utilizing custom workflows, potentially allowing the execution of malicious code on the user’s system. This advisory outlines the impacted users, provides details on the security patch, and suggests mitigation strategies.
The vulnerability is addressed in Nuclei v3.2.0. Users are strongly recommended to update to this version to mitigate the security risk.
The vulnerability stems from an oversight in the workflow execution mechanism, where unsigned code templates could be executed, bypassing the security measures intended to authenticate the integrity and source of the templates. This issue is isolated to workflow executions and does not affect direct template executions.
The only effective workaround, aside from upgrading, is to avoid the use of custom workflows altogether. This approach limits functionality but ensures security until the upgrade can be performed.
We extend our sincere gratitude to @gpc1996 for their diligence in identifying and reporting this vulnerability.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/projectdiscovery/nuclei/v3 | ge | 3.0.0 | |
github.com/projectdiscovery/nuclei/v3 | lt | 3.2.0 |
docs.projectdiscovery.io/templates/protocols/code
docs.projectdiscovery.io/templates/reference/template-signing
docs.projectdiscovery.io/templates/workflows/overview
github.com/projectdiscovery/nuclei
github.com/projectdiscovery/nuclei/commit/e86f38299765b82ad724fdb701557e0eaff3884d
github.com/projectdiscovery/nuclei/pull/4822
github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q
nvd.nist.gov/vuln/detail/CVE-2024-27920
7.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
7.5 High
AI Score
Confidence
Low
0.0005 Low
EPSS
Percentile
17.1%