Vulnerability Report: GO-2024-2645
- CVE-2024-27920, GHSA-w5wx-6g2r-r78q
- Affects: github.com/projectdiscovery/nuclei, github.com/projectdiscovery/nuclei/v2, and 1 more
- Published: Jun 04, 2024
- Modified: Jun 28, 2024
- Unreviewed
Nuclei allows unsigned code template execution through workflows in github.com/projectdiscovery/nuclei
For detailed information about this vulnerability, visit https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q or https://nvd.nist.gov/vuln/detail/CVE-2024-27920.
Affected Modules
-
PathGo Versions
-
all versions, no known fixed
-
all versions, no known fixed
-
from v3.0.0 before v3.2.0
Aliases
References
- https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q
- https://nvd.nist.gov/vuln/detail/CVE-2024-27920
- https://github.com/projectdiscovery/nuclei/commit/e86f38299765b82ad724fdb701557e0eaff3884d
- https://github.com/projectdiscovery/nuclei/pull/4822
- https://docs.projectdiscovery.io/templates/protocols/code
- https://docs.projectdiscovery.io/templates/reference/template-signing
- https://docs.projectdiscovery.io/templates/workflows/overview
- https://vuln.go.dev/ID/GO-2024-2645.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.