CVE-2009-0545

cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zeroshell:zeroshell:1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta10:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta11:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta4:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta5:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta6:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta7:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta8:*:*:*:*:*:*
cpe:2.3:a:zeroshell:zeroshell:1.0:beta9:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://www.ikkisoft.com/stuff/LC-2009-01.txt - Exploit () http://www.ikkisoft.com/stuff/LC-2009-01.txt - Exploit
References () http://www.securityfocus.com/archive/1/500763/100/0/threaded - () http://www.securityfocus.com/archive/1/500763/100/0/threaded -
References () http://www.vupen.com/english/advisories/2009/0385 - () http://www.vupen.com/english/advisories/2009/0385 -
References () http://www.zeroshell.net/eng/announcements/ - Patch, Vendor Advisory () http://www.zeroshell.net/eng/announcements/ - Patch, Vendor Advisory
References () http://www.zeroshell.net/eng/patch-details/#C100 - Patch () http://www.zeroshell.net/eng/patch-details/#C100 - Patch
References () https://www.exploit-db.com/exploits/8023 - () https://www.exploit-db.com/exploits/8023 -

Information

Published : 2009-02-12 23:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0545

Mitre link : CVE-2009-0545

CVE.ORG link : CVE-2009-0545


JSON object : View

Products Affected

zeroshell

  • zeroshell
CWE
CWE-20

Improper Input Validation