Zen Load Balancer 3.10.1 allows remote authenticated admin users to execute arbitrary commands as root via shell metacharacters in the index.cgi?action=View_Cert certname parameter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106812 | Third Party Advisory |
https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/106812 | Third Party Advisory |
https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106812 - Third Party Advisory | |
References | () https://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html - Exploit, Third Party Advisory |
Information
Published : 2019-02-01 09:29
Updated : 2024-11-21 04:47
NVD link : CVE-2019-7301
Mitre link : CVE-2019-7301
CVE.ORG link : CVE-2019-7301
JSON object : View
Products Affected
zevenet
- zen_load_balancer
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')