Miggo Logo

CVE-2023-37896:
Nuclei Path Traversal vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.6985%
Published
8/4/2023
Updated
11/7/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/projectdiscovery/nuclei/v2go< 2.9.92.9.9
github.com/projectdiscovery/nucleigo< 2.9.92.9.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper path sanitization when validating payload paths in sandbox mode. The patch in PR #3927 specifically modified path validation logic to use absolute paths and implement proper directory checks. The original vulnerable function likely contained a path check using string prefixes without resolving relative paths first, as evidenced by the discussion in the PR comments about adding absolute path conversion and directory validation. The CWE-22 classification and vulnerability description both confirm this was a path traversal issue in payload loading validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Ov*rvi*w W* **v* i**nti*i** *n* ***r*ss** * s**urity issu* in t** Nu*l*i proj**t t**t *****t** us*rs utilizin* Nu*l*i *s ***o *o** (S*K)** runnin* ***ustom t*mpl*t*s**. T*is issu* *i* not *****t *LI us*rs. T** pro*l*m w*s r*l*t** to s*nitiz*tion

Reasoning

T** vuln*r**ility st*mm** *rom improp*r p*t* s*nitiz*tion w**n v*li**tin* p*ylo** p*t*s in s*n**ox mo**. T** p*t** in PR #**** sp**i*i**lly mo*i*i** p*t* v*li**tion lo*i* to us* **solut* p*t*s *n* impl*m*nt prop*r *ir**tory ****ks. T** ori*in*l vuln*