๐Ÿ” CVE Alert

CVE-2012-10048

UNKNOWN 0.0

Zenoss 3.x showDaemonXMLConfig Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Zenoss Core 3.x contains a command injection vulnerability in the showDaemonXMLConfig endpoint. The daemon parameter is passed directly to a Popen() call in ZenossInfo.py without proper sanitation, allowing authenticated users to execute arbitrary commands on the server as the zenoss user.

CWE CWE-22
Vendor zenoss, inc.
Product zenoss core
Published Aug 8, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for zenoss, inc. zenoss core

Be the first to know when new unknown vulnerabilities affecting zenoss, inc. zenoss core are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Zenoss, Inc. / Zenoss Core
3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/20205 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/zenoss_showdaemonxmlconfig_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/37571 web.archive.org: http://web.archive.org/web/20221203180334/https://itsecuritysolutions.org/2012-07-30-zenoss-3.2.1-multiple-security-vulnerabilities/ sourceforge.net: https://sourceforge.net/projects/zenoss/ vulncheck.com: https://www.vulncheck.com/advisories/zenoss-command-execution

Credits

bcoles