CVE-2024-40641:
projectdiscovery/nuclei allows unsigned code template execution through workflows
7.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.01907%
CWE
Published
7/17/2024
Updated
8/6/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/projectdiscovery/nuclei/v3 | go | < 3.3.0 | 3.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) The workflow loader doesn't properly distinguish between legitimate workflow files and code templates masquerading as workflows, allowing execution through the -w flag. 2) The code execution engine processes unauthorized code blocks when they appear in workflow-context files. The combination of these flaws bypasses the -code flag requirement and signature validation. The high confidence for the workflow loader comes from its direct role in processing the malicious YAML
structure, while the medium confidence for the executor compilation reflects the broader execution context handling.