CVE-2023-37896:
Nuclei Path Traversal vulnerability
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.6985%
CWE
Published
8/4/2023
Updated
11/7/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/projectdiscovery/nuclei/v2 | go | < 2.9.9 | 2.9.9 |
github.com/projectdiscovery/nuclei | go | < 2.9.9 | 2.9.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper path sanitization when validating payload paths in sandbox mode. The patch in PR #3927 specifically modified path validation logic to use absolute paths and implement proper directory checks. The original vulnerable function likely contained a path check using string prefixes without resolving relative paths first, as evidenced by the discussion in the PR comments about adding absolute path conversion and directory validation. The CWE-22 classification and vulnerability description both confirm this was a path traversal issue in payload loading validation.