Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] -tc is not working as intended with CVE id's #6010

Closed
1 task done
mastercho opened this issue Jan 29, 2025 · 6 comments · Fixed by #6016
Closed
1 task done

[BUG] -tc is not working as intended with CVE id's #6010

mastercho opened this issue Jan 29, 2025 · 6 comments · Fixed by #6016
Assignees
Labels
Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors.
Milestone

Comments

@mastercho
Copy link

Is there an existing issue for this?

  • I have searched the existing issues.

Current Behavior

Currently when using

nuclei -u https://www.site.com/ -nmhe -tc "contains(id,'CVE-2021-3110')"

returns [FTL] Could not run nuclei: no templates provided for scan

But when we try to run

nuclei -u https://www.site.com/ -nmhe -id CVE-2021-3110
or

nuclei -u https://www.site.com/ -nmhe -tc "contains(id,'tech-detect')"

Its works as it should be, for some reason -tc parameter is not working with CVE's

Expected Behavior

To execute given CVE template ids

Steps To Reproduce

nuclei -u https://www.site.com/ -nmhe -tc "contains(id,'CVE-2021-3110')

Relevant log output

Environment

- OS: Ubuntu 21
- Nuclei: 3.3.8
- Go: 1.22.0

Anything else?

No response

@mastercho mastercho added the Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors. label Jan 29, 2025
@dwisiswant0
Copy link
Member

Note that the value is case-sensitive.

$ nuclei -tc "contains(id, 'cve-2021-3110')" -vv

                     __     _
   ____  __  _______/ /__  (_)
  / __ \/ / / / ___/ / _ \/ /
 / / / / /_/ / /__/ /  __/ /
/_/ /_/\__,_/\___/_/\___/_/   v3.3.8

		projectdiscovery.io

[INF] Current nuclei version: v3.3.8 (latest)
[INF] Current nuclei-templates version: v10.1.2 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 52
[INF] Templates loaded for current scan: 1
[INF] Executing 1 signed templates from projectdiscovery/nuclei-templates
[CVE-2021-3110] PrestaShop 1.7.7.0 - SQL Injection (@jaimin gondaliya) [critical]
[INF] No results found. Better luck next time!

@dwisiswant0 dwisiswant0 closed this as not planned Won't fix, can't repro, duplicate, stale Jan 30, 2025
@dwisiswant0
Copy link
Member

nuclei -tc "contains(to_upper(id), 'CVE-202')" -vv

@mastercho
Copy link
Author

Note that the value is case-sensitive.

$ nuclei -tc "contains(id, 'cve-2021-3110')" -vv

                 __     _

____ __ / / ()
/ __ / / / / / / _ / /
/ / / / /
/ / /
/ / __/ /
/
/ /
/_
,
/_/_/_/_/ v3.3.8

  projectdiscovery.io

[INF] Current nuclei version: v3.3.8 (latest)
[INF] Current nuclei-templates version: v10.1.2 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 52
[INF] Templates loaded for current scan: 1
[INF] Executing 1 signed templates from projectdiscovery/nuclei-templates
[CVE-2021-3110] PrestaShop 1.7.7.0 - SQL Injection (@jaimin gondaliya) [critical]
[INF] No results found. Better luck next time!

Template ID is uppercase in template itself, and -id works correctly when set it, why nowhere is stated that -tc need to be always lowercase?

@dwisiswant0
Copy link
Member

Template ID is uppercase in template itself

I see, didn't notice that. Reopening.

@dwisiswant0
Copy link
Member

#6016 should fix this issue.

@mastercho
Copy link
Author

Yep that PR might fix the issue, thanks

@ehsandeep ehsandeep added this to the Nuclei v3.3.9 milestone Jan 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants