|Category:||Web application abuses|
|Title:||ZeroShell <= 1.0beta11 RCE Vulnerability|
|Summary:||ZeroShell is prone to a remote code execution (RCE) vulnerability; because it fails to sufficiently sanitize user-supplied input.|
ZeroShell is prone to a remote code execution (RCE) vulnerability
because it fails to sufficiently sanitize user-supplied input.
Input to the 'type' value in /cgi-bin/kerbynet is not properly sanitized.
An attacker can exploit this vulnerability to view files or execute
arbitrary script code in the context of the web server process. This may aid in further attacks.
ZeroShell versions 1.0beta11 and below.
Update to version 1.0beta12 or later.
BugTraq ID: 33702|
Common Vulnerability Exposure (CVE) ID: CVE-2009-0545
Bugtraq: 20090209 ZeroShell <= 1.0beta11 Remote Code Execution (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.