CVE-2012-10048
Severity CVSS v4.0:
HIGH
Type:
CWE-22
Path Traversal
Publication date:
08/08/2025
Last modified:
08/08/2025
Description
Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- http://web.archive.org/web/20221203180334/https://itsecuritysolutions.org/2012-07-30-zenoss-3.2.1-multiple-security-vulnerabilities/
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
- https://sourceforge.net/projects/zenoss/
- https://www.exploit-db.com/exploits/20205
- https://www.exploit-db.com/exploits/37571
- https://www.vulncheck.com/advisories/zenoss-command-execution



