|Category:||Web application abuses|
|Title:||ZeroShell < 3.9.3 RCE Vulnerability|
|Summary:||ZeroShell is prone to a remote code execution (RCE) vulnerability; because it fails to sufficiently sanitize user-supplied input.|
ZeroShell is prone to a remote code execution (RCE) vulnerability
because it fails to sufficiently sanitize user-supplied input.
Input to the 'type' value in /cgi-bin/kerbynet is not properly sanitized.
An attacker can exploit this vulnerability to view files or execute
arbitrary script code in the context of the web server process. This may aid in further attacks.
ZeroShell versions prior to 3.9.3.
Update to version 3.9.3 or later.
Common Vulnerability Exposure (CVE) ID: CVE-2019-12725|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.