CVE-2019-12725

CRITICAL EXPLOITED IN THE WILD NUCLEI

Zeroshell - OS Command Injection

Title source: rule

Description

Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.

Exploits (10)

exploitdb WORKING POC VERIFIED
by Giuseppe Fuggiano · rubywebappslinux
https://www.exploit-db.com/exploits/49096
exploitdb WORKING POC
by Fellipe Oliveira · pythonwebappslinux
https://www.exploit-db.com/exploits/49862
nomisec WORKING POC 173 stars
by sma11new · remote
https://github.com/sma11new/PocList
github WORKING POC 11 stars
by X-C3LL · pythonpoc
https://github.com/X-C3LL/PoC-CVEs/tree/master/CVE-2019-12725
nomisec WORKING POC 2 stars
by hev0x · remote
https://github.com/hev0x/CVE-2019-12725-Command-Injection
nomisec WORKING POC 1 stars
by YZS17 · remote
https://github.com/YZS17/CVE-2019-12725
nomisec WORKING POC 1 stars
by givemefivw · remote
https://github.com/givemefivw/CVE-2019-12725
nomisec WORKING POC
by t0mmy4 · poc
https://github.com/t0mmy4/CVE-2019-12725-modified-exp
nomisec WORKING POC
by gougou123-hash · remote
https://github.com/gougou123-hash/CVE-2019-12725
vulncheck_xdb WORKING POC
remote
https://github.com/nowindows9/CVE-2019-12725-modified-exp

Nuclei Templates (1)

Zeroshell 3.9.0 - Remote Command Execution
CRITICALby dwisiswant0,akincibor
Shodan: http.title:"zeroshell"
FOFA: title="zeroshell"

Scores

CVSS v3 9.8
EPSS 0.9401
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-06-03
InTheWild.io 2021-09-30
CWE
CWE-78
Status published
Products (1)
zeroshell/zeroshell 3.9.0
Published Jul 19, 2019
Tracked Since Feb 18, 2026