Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
CVSS
No CVSS.
References
Configurations
No configuration.
History
08 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-08 19:15
Updated : 2025-08-08 20:30
NVD link : CVE-2012-10048
Mitre link : CVE-2012-10048
CVE.ORG link : CVE-2012-10048
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')