{"id":"CVE-2023-50094","details":"reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.","aliases":["GHSA-fx7f-f735-vgh4"],"modified":"2026-04-10T05:05:17.371492Z","published":"2024-01-01T18:15:09.130Z","references":[{"type":"WEB","url":"https://github.com/yogeshojha/rengine/security"},{"type":"WEB","url":"https://github.com/yogeshojha/rengine/blob/53d9f505f04861a5040195ea71f20907ff90577a/web/api/views.py#L268-L275"},{"type":"WEB","url":"https://github.com/yogeshojha/rengine/blob/5e120bd5f9dfbd1da82a193e8c9702e483d38d22/web/api/views.py#L195"},{"type":"ADVISORY","url":"https://github.com/yogeshojha/rengine/releases"},{"type":"ADVISORY","url":"https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4"},{"type":"FIX","url":"https://github.com/yogeshojha/rengine/commit/3d5f1724dd12cf9861443742e7d7c02ff8c75a6f"},{"type":"FIX","url":"https://github.com/yogeshojha/rengine/commit/edd3c85ee16f93804ad38dac5602549d2d30a93e"},{"type":"EVIDENCE","url":"https://www.mattz.io/posts/cve-2023-50094/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yogeshojha/rengine","events":[{"introduced":"0"},{"last_affected":"fd5a5e5faa1e289cbf421e8aaf6014452efaef1f"},{"fixed":"3d5f1724dd12cf9861443742e7d7c02ff8c75a6f"},{"fixed":"edd3c85ee16f93804ad38dac5602549d2d30a93e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.0.2"}]}}],"versions":["v0.1","v0.2","v0.3","v0.5","v1.0","v1.0.1","v1.0.2","v1.1.0","v1.2.0","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.1.0","v2.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-50094.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}