Nuclei Path Traversal vulnerability
CVE-2023-37896
7.5HIGH
Summary
A sandbox bypass vulnerability affected Nuclei users who utilized the tool as a Go code SDK prior to version 2.9.9. The issue, which did not impact CLI users, stemmed from improper sanitization during payload loading in sandbox mode. Specifically, relative paths could evade security checks, posing a risk of unauthorized file access from the filesystem. This significant flaw has been rectified in version 2.9.9, where maintainers have made sandbox mode the default setting for filesystem loading. Users are now presented with new options to manage local file access and network restrictions effectively, enhancing security for those employing custom templates.
Affected Version(s)
nuclei < 2.9.9
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved