Description
reNgine 2.2.0 contains a command injection vulnerability in the nmap_cmd parameter of scan engine configuration that allows authenticated attackers to execute arbitrary commands. Attackers can modify the nmap_cmd parameter with malicious base64-encoded payloads to achieve remote code execution during scan engine configuration.
Problem types
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
2.2.0
Credits
Caner Tercan
References
www.exploit-db.com/exploits/52081 (ExploitDB-52081)
rengine.wiki/ (Rengine Wiki Homepage)
github.com/yogeshojha/rengine (Rengine GitHub Repository)
www.vulncheck.com/...injection-via-scan-engine-configuration (VulnCheck Advisory: reNgine 2.2.0 Authenticated Command Injection via Scan Engine Configuration)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.