CVE-2012-10048

Zenoss Core 3.x - Command Injection

Title source: llm

Description

Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/20205
metasploit WORKING POC GOOD
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
exploitdb WORKING POC VERIFIED
by Brendan Coles · textwebappsmultiple
https://www.exploit-db.com/exploits/37571

Scores

EPSS 0.5020
EPSS Percentile 97.8%

Classification

CWE
CWE-22
Status draft

Timeline

Published Aug 08, 2025
Tracked Since Feb 18, 2026