reNgine is an automated reconnaissance framework for web applications. In affected versions a user can inject commands via the nmap_cmd parameters. This issue has been addressed in commit `c28e5c8d` and is expected in the next versioned release. Users are advised to filter user input and monitor the project for a new release.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9 | vendor advisory exploit |
https://github.com/yogeshojha/rengine/commit/c28e5c8d304478a787811580b4d80b330920ace4 | patch |