CVE-2012-10048
HIGHZenoss Core 3.x - Command Injection
Title source: llmDescription
Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/20205
exploitdb
WORKING POC
VERIFIED
by Brendan Coles · textwebappsmultiple
https://www.exploit-db.com/exploits/37571
metasploit
WORKING POC
GOOD
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
References (6)
Scores
CVSS v4
8.7
EPSS
0.5431
EPSS Percentile
98.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (2)
Zenoss, Inc./Zenoss Core
3.0
Zenoss, Inc./Zenoss Core
3.x
Published
Aug 08, 2025
Tracked Since
Feb 18, 2026