Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Nuclei: Environment variable disclosure via Response-Derived DSL Expressions
Vulnerability Description
Nuclei is a vulnerability scanner built on a simple YAML-based DSL. From version 3.0.0 to before version 3.8.0, a vulnerability in Nuclei's expression evaluation engine makes it possible for a malicious target server to inject and execute supported DSL expressions. This happens when HTTP response data containing helper/function syntax gets reused by multi-step templates. If the -env-vars / -ev option is explicitly enabled, this can expose host environment variables. That option is off by default, so standard configurations are not affected by the information disclosure risk. This issue has been patched in version 3.8.0.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Nuclei 代码注入漏洞
Vulnerability Description
Nuclei是ProjectDiscovery开源的一个基于简单 YAML 的 DSL 的快速可定制漏洞扫描器。 Nuclei 3.0.0版本至3.8.0之前版本存在代码注入漏洞,该漏洞源于表达式评估引擎可能被恶意目标服务器注入DSL表达式,当启用-env-vars选项时可能暴露环境变量。
CVSS Information
N/A
Vulnerability Type
N/A