vendor:
ZeroShell
by:
Juan Manuel Fernandez, Giuseppe Fuggiano
9.8
CVSS
CRITICAL
Command Injection
78
CWE
Product Name: ZeroShell
Affected Version From: 3.9.2000
Affected Version To: 3.9.2000
Patch Exists: YES
Related CWE: CVE-2019-12725
CPE: a:zeroshell:zeroshell:3.9.0
Tags: packetstorm,cve,cve2019,rce,zeroshell
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.zeroshell.org/new-release-and-critical-vulnerability/, https://www.tarlogic.com/advisories/zeroshell-rce-root.txt, https://github.com/X-C3LL/PoC-CVEs/blob/master/CVE-2019-12725/ZeroShell-RCE-EoP.py, https://zeroshell.org/blog/, http://packetstormsecurity.com/files/160211/ZeroShell-3.9.0-Remote-Command-Execution.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'zeroshell', 'product': 'zeroshell'}
Platforms Tested: Unix, Linux
2019
Zeroshell 3.9.0 Remote Command Execution
This module exploits an unauthenticated command injection vulnerability found in ZeroShell 3.9.0 in the "/cgi-bin/kerbynet" url. As sudo is configured to execute /bin/tar without a password (NOPASSWD) it is possible to run root commands using the "checkpoint" tar options.
Mitigation:
Update to the latest version of ZeroShell