CVE-2012-10048

HIGH

Zenoss Core 3.x - Command Injection

Title source: llm

Description

Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/20205
exploitdb WORKING POC VERIFIED
by Brendan Coles · textwebappsmultiple
https://www.exploit-db.com/exploits/37571
metasploit WORKING POC GOOD
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb

Scores

CVSS v4 8.7
EPSS 0.5431
EPSS Percentile 98.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (2)
Zenoss, Inc./Zenoss Core 3.0
Zenoss, Inc./Zenoss Core 3.x
Published Aug 08, 2025
Tracked Since Feb 18, 2026