CVE-2009-0545

EXPLOITED NUCLEI

ZeroShell <1.0beta11 - Command Injection

Title source: llm

Description

cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.

Exploits (2)

exploitdb WORKING POC VERIFIED
by ikki · textremotehardware
https://www.exploit-db.com/exploits/8023
metasploit WORKING POC EXCELLENT
by Yann CAM · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/zeroshell_exec.rb

Nuclei Templates (1)

ZeroShell <= 1.0beta11 Remote Code Execution
CRITICALby geeknik
Shodan: http.title:"zeroshell"
FOFA: title="zeroshell"

Scores

EPSS 0.9401
EPSS Percentile 99.9%

Exploitation Intel

VulnCheck KEV 2019-06-13

Classification

CWE
CWE-20
Status draft

Affected Products (11)

zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell
zeroshell/zeroshell

Timeline

Published Feb 12, 2009
Tracked Since Feb 18, 2026