CVE-2019-12725
CRITICAL EXPLOITED IN THE WILD NUCLEIZeroshell - OS Command Injection
Title source: ruleDescription
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
Exploits (10)
exploitdb
WORKING POC
VERIFIED
by Giuseppe Fuggiano · rubywebappslinux
https://www.exploit-db.com/exploits/49096
exploitdb
WORKING POC
by Fellipe Oliveira · pythonwebappslinux
https://www.exploit-db.com/exploits/49862
github
WORKING POC
11 stars
by X-C3LL · pythonpoc
https://github.com/X-C3LL/PoC-CVEs/tree/master/CVE-2019-12725
nomisec
WORKING POC
2 stars
by hev0x · remote
https://github.com/hev0x/CVE-2019-12725-Command-Injection
Nuclei Templates (1)
Zeroshell 3.9.0 - Remote Command Execution
CRITICALby dwisiswant0,akincibor
Shodan:
http.title:"zeroshell"
FOFA:
title="zeroshell"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9401
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-06-03
InTheWild.io
2021-09-30
CWE
CWE-78
Status
published
Products (1)
zeroshell/zeroshell
3.9.0
Published
Jul 19, 2019
Tracked Since
Feb 18, 2026