Summary of Releases v9.7.3, v9.7.4, and v9.7.5
This month, we've released multiple versions of Nuclei Templates that bring numerous enhancements to Nuclei users.
Here are some highlighted stats from the combined releases:
🎉 157 new Templates added
🚀 20 first-time contributions
🔥 36 new CVEs added
Introduction
Welcome to the January 2024 edition of our Nuclei Templates Monthly Release. Kicking off the new year, the releases are packed with significant updates, including the addition of over 75 new local privilege escalation templates by our community member @daffainfo.
This month, we've added some templates for critical vulnerabilities. Among them, the critical vulnerabilities in Atlassian Confluence and Apache OFBiz have garnered significant attention. The Atlassian Confluence vulnerability (CVE-2023-22527) allows for remote code execution, posing a severe risk to numerous enterprises relying on this popular collaboration tool. Similarly, Apache OFBiz has been under the spotlight with multiple vulnerabilities, notably CVE-2023-51467 and CVE-2023-50968, leading to remote code execution and server-side request forgery, respectively.
Additionally, Adobe ColdFusion's deserialization issue (CVE-2023-44353) and GitLab's account takeover exploit (CVE-2023-7028) have raised serious concerns due to their widespread usage and the critical nature of these vulnerabilities.
New Templates Added
We are excited to announce the addition of 157 new templates to the Nuclei Templates project. These templates cover a wide range of security checks, from trending CVEs to local privilege escalation, empowering you to identify potential vulnerabilities efficiently. The contributions from our dedicated community have been immeasurably valuable in expanding the breadth of Nuclei's capabilities, and we extend our gratitude to all those involved.
New CVEs Added
This release incorporates 36 🔥 new CVEs, ensuring you remain current with the latest security vulnerabilities. By including these CVEs in the Nuclei Templates, we aim to provide you with the necessary tools to detect and mitigate potential risks proactively.
Bug Fixes and Enhancements
This month we have done several bug fixes and implemented enhancements to improve the overall functionality of Nuclei Templates. The following contributions from our community members have been instrumental in making these improvements:
- Added 75+ Local Privilege escalation templates #8818
- Added SMB misconfiguration templates
- Made enhancements in template tagging based on the template directories #8938
- Created Nuclei config profiles for different use cases, such as Bug Bounty, OSINT, compliance, etc #8859
- Added "local" tag in nuclei ignore file. For security reasons, these templates are not executed as part of the default Nuclei scan. To run these templates, users need to provide the
-code
flag along with-itags local
- Added and updated impact fields in the CVE Templates #8278
- Fixed a few templates producing false positive and false negative results
Highlighted CVE Templates
Here are some notable CVEs included in this release:
✅ CVE-2023-22527: Atlassian Confluence - Remote Code Execution
This critical vulnerability in Atlassian Confluence enables remote attackers to execute code on the affected systems.
✅ CVE-2023-44353: Adobe ColdFusion WDDX Deserialization Gadgets
Adobe ColdFusion is impacted by a critical deserialization issue, allowing attackers to execute arbitrary code remotely.
✅ CVE-2023-51467: Apache OFBiz < 18.12.11 - Remote Code Execution
A critical remote code execution vulnerability in Apache OFBiz versions prior to 18.12.11, posing significant security risks.
✅ CVE-2023-7028: GitLab - Account Takeover via Password Reset
This critical vulnerability in GitLab allows attackers to take over accounts via a password reset mechanism.
✅ CVE-2024-0204: Fortra GoAnywhere MFT - Authentication Bypass
A critical authentication bypass vulnerability in Fortra GoAnywhere MFT, potentially compromising system security.
✅ CVE-2024-23897: Jenkins < 2.441 - Arbitrary File Read
Jenkins versions prior to 2.441 are affected by a critical vulnerability that allows unauthorized arbitrary file reading.
✅ CVE-2023-50917: MajorDoMo thumb.php - OS Command Injection
A critical vulnerability in MajorDoMo's thumb.php, enabling attackers to perform OS command injection.
✅ CVE-2023-46805: Ivanti ICS - Authentication Bypass
A high severity vulnerability in Ivanti ICS that allows attackers to bypass authentication controls.
✅ CVE-2023-47211: ManageEngine OpManager - Directory Traversal
ManageEngine OpManager is susceptible to a high severity directory traversal vulnerability.
✅ CVE-2023-6063: WP Fastest Cache 1.2.2 - Unauthenticated SQL Injection
This high severity vulnerability in WP Fastest Cache 1.2.2 allows unauthenticated SQL injection attacks.
Community Spotlight
We express our sincere appreciation to the community members, including our first-time contributors for their contributions to the Nuclei Templates project.
- @PhillipoTF2 made their first contribution in #8965
- @sea-god made their first contribution in #7042
- @jmoraissec made their first contribution in #8966
- @hieuha made their first contribution in #8978
- @shivamsaraswat made their first contribution in #8919
- @dkasak made their first contribution in #8974
- @boy-hack made their first...
- @Blackbird594 made their first contribution in #8858
- @malacupa made their first contribution in #8812
- @fail-open made their first contribution in #8896
- @mailler0xa made their first contribution in #8925
- @juicewrldxxx made their first contribution in #8924
- @wpsec made their first contribution in #8931
Join the Nuclei Templates community on Discord, where you can actively participate, collaborate, and share valuable insights.
By leveraging Nuclei and actively engaging with the open-source community, or by becoming a part of the ProjectDiscovery Cloud Platform, companies can enhance their security measures, proactively address emerging threats, and establish a more secure digital landscape. Security represents a shared endeavor, and by collaborating, we can consistently adapt and confront the ever-evolving challenges posed by cyber threats