CVE-2009-20011
ContentKeeper Web Appliance < 125.10 RCE via mimencode
CVSS Score
0.0
EPSS Score
60.4%
EPSS Percentile
98th
ContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 are vulnerable to remote command execution due to insecure handling of file uploads via the mimencode CGI utility. The vulnerability allows unauthenticated attackers to upload and execute arbitrary scripts as the Apache user. Additionally, the exploit can optionally escalate privileges by abusing insecure PATH usage in the benetool binary, resulting in root-level access if successful.
| CWE | CWE-434 CWE-78 |
| Vendor | contentkeeper technologies |
| Product | contentkeeper web appliance |
| Published | Aug 30, 2025 |
| Last Updated | May 14, 2026 |
Stay Ahead of the Next One
Get instant alerts for contentkeeper technologies contentkeeper web appliance
Be the first to know when new unknown vulnerabilities affecting contentkeeper technologies contentkeeper web appliance are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
ContentKeeper Technologies / ContentKeeper Web Appliance
* < 125.10
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/contentkeeperweb_mimencode.rb aushack.com: http://www.aushack.com/200904-contentkeeper.txt ativion.com: https://www.ativion.com/contentkeeper/ web.archive.org: https://web.archive.org/web/20081220084819/http://www.contentkeeper.com/ vulncheck.com: https://www.vulncheck.com/advisories/contentkeeper-web-appliance-rce-via-mimencode
Credits
Patrick Webster (aushack)