reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/yogeshojha/rengine/commit/a658b8519f1a3347634b04733cf91ed933af1f99 | Patch |
https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38 | Exploit Vendor Advisory |
Configurations
History
13 May 2025, 19:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:yogeshojha:rengine:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
First Time |
Yogeshojha
Yogeshojha rengine |
|
Summary |
|
|
References | () https://github.com/yogeshojha/rengine/commit/a658b8519f1a3347634b04733cf91ed933af1f99 - Patch | |
References | () https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38 - Exploit, Vendor Advisory |
03 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-03 21:15
Updated : 2025-05-13 19:23
NVD link : CVE-2025-24899
Mitre link : CVE-2025-24899
CVE.ORG link : CVE-2025-24899
JSON object : View
Products Affected
yogeshojha
- rengine
CWE