CVE-2024-43381

reNgine is an automated reconnaissance framework for web applications. Versions 2.1.2 and prior are susceptible to Stored Cross-Site Scripting (XSS) attacks. This vulnerability occurs when scanning a domain, and if the target domain's DNS record contains an XSS payload, it leads to the execution of malicious scripts in the reNgine's dashboard view when any user views the scan results. The XSS payload is directly fetched from the DNS record of the remote target domain. Consequently, an attacker can execute the attack without requiring any additional input from the target or the reNgine user. A patch is available and expected to be part of version 2.1.3.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*

History

11 Sep 2024, 13:02

Type Values Removed Values Added
CPE cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.0
v2 : unknown
v3 : 5.4
References () https://github.com/yogeshojha/rengine/commit/064bac1c7c4d2b90745bf225c92e74d83edb7a4d - () https://github.com/yogeshojha/rengine/commit/064bac1c7c4d2b90745bf225c92e74d83edb7a4d - Patch
References () https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7 - () https://github.com/yogeshojha/rengine/security/advisories/GHSA-96q4-fj2m-jqf7 - Exploit, Vendor Advisory
First Time Yogeshojha rengine
Yogeshojha

19 Aug 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) reNgine es un framework de reconocimiento automatizado para aplicaciones web. Las versiones 2.1.2 y anteriores son susceptibles a ataques de Cross-Site Scripting (XSS) Almacenado. Esta vulnerabilidad ocurre al escanear un dominio, y si el registro DNS del dominio de destino contiene un payload XSS, conduce a la ejecución de scripts maliciosos en la vista del panel de reNgine cuando cualquier usuario ve los resultados del escaneo. El payload XSS se obtiene directamente del registro DNS del dominio de destino remoto. En consecuencia, un atacante puede ejecutar el ataque sin requerir ninguna entrada adicional por parte del objetivo o del usuario de reNgine. Hay un parche disponible y se espera que forme parte de la versión 2.1.3.

16 Aug 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-16 15:15

Updated : 2024-09-11 13:02


NVD link : CVE-2024-43381

Mitre link : CVE-2024-43381

CVE.ORG link : CVE-2024-43381


JSON object : View

Products Affected

yogeshojha

  • rengine
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-87

Improper Neutralization of Alternate XSS Syntax