CVE-2023-50094 Scanner

CVE-2023-50094 Scanner - OS Command Injection vulnerability in reNgine

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

2 weeks 1 hour

Scan only one

Domain, IPv4

Toolbox

-

reNgine is an open-source, automated reconnaissance framework widely used by penetration testers and security researchers. It is particularly valued for its streamlined approach to information gathering and vulnerability detection during security assessments. The software supports advanced scanning techniques and is often deployed in scenarios where organizations need in-depth network reconnaissance.

The vulnerability checked by this scanner is an OS Command Injection flaw that affects reNgine versions 2.1.2 and earlier. This flaw allows adversaries with a valid session ID to inject arbitrary commands into the system. The commands execute with root privileges, posing a high risk to system integrity and confidentiality.

The vulnerability occurs in the API endpoint `/api/tools/waf_detector/?url=`, where unsanitized user input is processed by the `subprocess.check_output` function. Attackers can exploit this flaw by crafting a payload containing shell metacharacters to execute arbitrary commands. The weakness is categorized under CWE-78: Improper Neutralization of Special Elements used in an OS Command.

If exploited, this vulnerability can result in complete system compromise, unauthorized data access, and disruption of services. Since commands execute as root, attackers could potentially pivot further into the network or exfiltrate sensitive data. The exploit also significantly increases the likelihood of lateral movement within the system.

REFERENCES

Get started to protecting your Free Full Security Scan