vendor:
ZeroShell
by:
Luca Carettoni
7.5
CVSS
HIGH
Arbitrary Code Execution
78
CWE
Product Name: ZeroShell
Affected Version From: 1.0beta11
Affected Version To: 1.0beta11
Patch Exists: Yes
Related CWE: N/A
CPE: a:zeroshell:zeroshell
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
ZeroShell <= 1.0beta11 Remote Code Execution
ZeroShell is prone to an arbitrary code execution vulnerability due to an improper input validation mechanism. An aggressor may abuse this weakness in order to compromise the entire system. Authentication is not required in order to exploit this flaw. Proof of concept: /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;<CMD HERE>;%22 In addition to the Unix commands, it is possible to abuse the ZeroShell scripts themself. For instance it is likely to use the "getkey" script in order to retrieve remote files, including the content in the html page.
Mitigation:
Upgrade to the latest version of ZeroShell