Summary: A vulnerability in the open-source vulnerability scanner Nuclei allowed attackers to bypass signature verification, enabling the injection of malicious code into templates. This flaw has been fixed, but users are advised to update to the latest version to mitigate risks.
Threat Actor: Unknown | unknown
Victim: ProjectDiscovery | ProjectDiscovery
Key Point :
- A vulnerability tracked as CVE-2024-43405 allowed attackers to bypass Nuclei’s signature verification.
- The flaw was caused by mismatched interpretations of line breaks between Go’s regex and the YAML parser.
- Attackers could exploit the flaw by injecting additional malicious “# digest:” lines into templates.
- The vulnerability was responsibly disclosed and fixed in Nuclei v3.3.2.
- Users are advised to run Nuclei in isolated environments to prevent potential exploitation.