
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity vulnerability (CVE-2024-43405) was discovered in Nuclei, a widely-used open-source vulnerability scanner with over 21,000 GitHub stars and 2.1 million downloads. The vulnerability affects versions from 3.0.0 to 3.3.1 and was identified in the template signature verification system. The flaw was discovered by Wiz's engineering team and was patched in version 3.3.2, released in September 2024 (Wiz Blog, GitHub Advisory).
The vulnerability stems from a discrepancy between how the signature verification process and the YAML parser handle newline characters, specifically in the signer package. The issue arises from the mismatch between Go's regex-based signature verification, which treats \r as part of the same line, while the YAML parser interprets it as a line break. The vulnerability carries a CVSS score of 7.8 (HIGH) according to NVD, with a vector string of CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD, SecurityWeek).
The vulnerability could allow attackers to bypass the signature check and execute malicious code via custom code templates. This is particularly concerning for organizations running untrusted or community-contributed templates without proper validation or isolation. The impact extends to both CLI users executing custom code templates from unverified sources and SDK users integrating Nuclei into their platforms, especially if they permit end-users to execute custom code templates (GitHub Advisory).
The primary mitigation is to upgrade to Nuclei version 3.3.2 or newer, which contains the patch for this vulnerability. For users unable to upgrade immediately, it is recommended to disable running custom code templates and refrain from using custom templates. Organizations should also ensure Nuclei is run in a sandboxed or highly isolated environment to prevent potential exploitation of untrusted templates (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."