CVE-2012-10048

Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.
CVSS

No CVSS.

Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) Zenoss Core 3.x contiene una vulnerabilidad de inyección de comandos en el endpoint showDaemonXMLConfig. El parámetro daemon se pasa directamente a una llamada Popen() en ZenossInfo.py sin la debida depuración, lo que permite a los usuarios autenticados ejecutar comandos arbitrarios en el servidor como usuarios de zenoss.

08 Aug 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-08 19:15

Updated : 2026-04-15 00:35


NVD link : CVE-2012-10048

Mitre link : CVE-2012-10048

CVE.ORG link : CVE-2012-10048


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')