PR
Add CVE-2024-3408 D-Tale authenticated RCE
projectdiscovery/nuclei-templates#15094

PR Information


Template validation

  • Validated with a host running a vulnerable version and/or configuration (True Positive)
  • Validated with a host running a patched version and/or configuration (avoid False Positive)

How to test

  1. Deploy a vulnerable D-Tale instance with authentication enabled.
  2. Run the template using Nuclei with a valid authenticated session cookie supplied at runtime.
  3. The template performs the following actions:
    • Uploads a CSV file to obtain a valid data_id
    • Enables custom filters via the update-settings endpoint
    • Triggers execution via the test-filter endpoint
  4. Successful exploitation is indicated by a positive match and confirmed via server-side logs (side-effect RCE; command output is not returned in HTTP responses).

Additional Details

The template was validated against a known vulnerable D-Tale deployment.

Validation confirmed:

  • Successful request chaining
  • Proper filter enablement
  • Server-side command execution (verified via application logs)

The full nuclei -debug output, vulnerable environment details, and any additional validation artifacts required for bounty verification will be sent to templates@projectdiscovery.io shortly.

Proof of execution

Proof of execution

Additional References


Bounty Claim

/claim #14488

Claim

Total prize pool $200
Total paid $0
Status Pending
Submitted January 30, 2026
Last updated January 30, 2026

Contributors

AK

Akinniranye Samuel Tomiwa

@samuel-asleep

100%

Sponsors

SO

Solari Systems

@SolariSystems

$100
PR

ProjectDiscovery

@projectdiscovery

$100