reNgine is an automated reconnaissance framework for web applications. In affected versions a user can inject commands via the nmap_cmd parameters. This issue has been addressed in commit `c28e5c8d` and is expected in the next versioned release. Users are advised to filter user input and monitor the project for a new release.
References
Link | Resource |
---|---|
https://github.com/yogeshojha/rengine/commit/c28e5c8d304478a787811580b4d80b330920ace4 | Patch |
https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9 | Exploit Vendor Advisory |
Configurations
History
13 May 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yogeshojha/rengine/commit/c28e5c8d304478a787811580b4d80b330920ace4 - Patch | |
References | () https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:yogeshojha:rengine:2.2.0:*:*:*:*:*:*:* | |
First Time |
Yogeshojha
Yogeshojha rengine |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Summary |
|
03 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-03 21:15
Updated : 2025-05-13 19:21
NVD link : CVE-2025-24962
Mitre link : CVE-2025-24962
CVE.ORG link : CVE-2025-24962
JSON object : View
Products Affected
yogeshojha
- rengine
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')