
CVE-2024-43405 – Nuclei Template Signature Verification Bypass
https://notcve.org/view.php?id=CVE-2024-43405
04 Sep 2024 — Nuclei is a vulnerability scanner powered by YAML based templates. Starting in version 3.0.0 and prior to version 3.3.2, a vulnerability in Nuclei's template signature verification system could allow an attacker to bypass the signature check and possibly execute malicious code via custom code template. The vulnerability is present in the template signature verification process, specifically in the `signer` package. The vulnerability stems from a discrepancy between how the signature verification process and... • https://github.com/projectdiscovery/nuclei/commit/0da993afe6d41b4b1b814e8fad23a2acba13c60a • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-40641 – Unsigned code template execution through workflows in projectdiscovery/nuclei
https://notcve.org/view.php?id=CVE-2024-40641
17 Jul 2024 — Nuclei is a fast and customizable vulnerability scanner based on simple YAML based DSL. In affected versions it a way to execute code template without -code option and signature has been discovered. Some web applications inherit from Nuclei and allow users to edit and execute workflow files. In this case, users can execute arbitrary commands. (Although, as far as I know, most web applications use -t to execute). • https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-c3q9-c27p-cw9h • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-27920 – Unsigned code template execution through workflows in projectdiscovery/nuclei
https://notcve.org/view.php?id=CVE-2024-27920
15 Mar 2024 — projectdiscovery/nuclei is a fast and customisable vulnerability scanner based on simple YAML based DSL. A significant security oversight was identified in Nuclei v3, involving the execution of unsigned code templates through workflows. This vulnerability specifically affects users utilizing custom workflows, potentially allowing the execution of malicious code on the user's system. This advisory outlines the impacted users, provides details on the security patch, and suggests mitigation strategies. The vul... • https://docs.projectdiscovery.io/templates/protocols/code • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2023-37896 – Nuclei Path Traversal vulnerability
https://notcve.org/view.php?id=CVE-2023-37896
04 Aug 2023 — Nuclei is a vulnerability scanner. Prior to version 2.9.9, a security issue in the Nuclei project affected users utilizing Nuclei as Go code (SDK) running custom templates. This issue did not affect CLI users. The problem was related to sanitization issues with payload loading in sandbox mode. There was a potential risk with payloads loading in sandbox mode. • https://github.com/projectdiscovery/nuclei/pull/3927 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •