漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Unsigned code template execution through workflows in projectdiscovery/nuclei
Vulnerability Description
Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). This issue has been addressed in version 3.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Nuclei 安全漏洞
Vulnerability Description
Nuclei是ProjectDiscovery开源的一个基于简单 YAML 的 DSL 的快速可定制漏洞扫描器。 Nuclei 3.0.0至3.3.0之前版本存在安全漏洞,该漏洞源于无需-code选项和签名即可执行代码模板,从而导致攻击者可执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A