CVE-2012-10048
Zenoss Core 3.x - Command Injection
Title source: llmDescription
Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteunix
https://www.exploit-db.com/exploits/20205
metasploit
WORKING POC
GOOD
by bcoles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb
exploitdb
WORKING POC
VERIFIED
by Brendan Coles · textwebappsmultiple
https://www.exploit-db.com/exploits/37571
References (6)
Scores
EPSS
0.5020
EPSS Percentile
97.8%
Classification
CWE
CWE-22
Status
draft
Timeline
Published
Aug 08, 2025
Tracked Since
Feb 18, 2026