PR Information
-
Added CVE-2024-3408
-
Description:
This PR adds a Nuclei template for CVE-2024-3408, an authenticated remote code execution vulnerability in D-Tale.
The issue stems from improper handling of custom filters, which can result in arbitrary command execution when filters are enabled.
-
References:
Template validation
- Validated with a host running a vulnerable version and/or configuration (True Positive)
- Validated with a host running a patched version and/or configuration (avoid False Positive)
How to test
- Deploy a vulnerable D-Tale instance with authentication enabled.
- Run the template using Nuclei with a valid authenticated session cookie supplied at runtime.
- The template performs the following actions:
- Uploads a CSV file to obtain a valid
data_id
- Enables custom filters via the
update-settings endpoint
- Triggers execution via the
test-filter endpoint
- Successful exploitation is indicated by a positive match and confirmed via server-side logs
(side-effect RCE; command output is not returned in HTTP responses).
Additional Details
The template was validated against a known vulnerable D-Tale deployment.
Validation confirmed:
- Successful request chaining
- Proper filter enablement
- Server-side command execution (verified via application logs)
The full nuclei -debug output, vulnerable environment details, and any additional validation artifacts required for bounty verification will be sent to templates@projectdiscovery.io shortly.
Proof of execution

Additional References
Bounty Claim
/claim #14488