SB2019072011 - OS Command Injection in ZeroShell Zeroshell



SB2019072011 - OS Command Injection in ZeroShell Zeroshell

Published: July 20, 2019 Updated: July 23, 2019

Security Bulletin ID SB2019072011
Severity
Critical
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2019-12725)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to the some parameters inside a script are used without a properly sanitization. A remote unauthenticated attacker can inject OS commands inside the vulnerable parameters and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Example of vulnerable parameters:
/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509view&User=Admin&x509type='%0Auname -a%0A'
/cgi-bin/kerbynet?Action=x509view&Section=NoAuthREQ&User=&x509type='%0A/etc/sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=id%0A'


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.