CVE-2020-29390 Scanner
CVE-2020-29390 Scanner - Command Injection vulnerability in Zeroshell
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
8 days 18 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Zeroshell is a Linux-based distribution for servers and embedded devices, particularly designed for network management tasks. It is primarily used by IT administrators and network specialists to manage and secure network connectivity and access. Users deploy Zeroshell to handle services such as routing, bridging, firewalling, and VPN configurations. The software is known for its flexibility and ease of deployment in various network environments, including educational institutions, small to medium-sized enterprises, and remote offices. Its web-based interface allows an easy and efficient setup, making it accessible even for individuals with limited technical expertise.
The Command Injection vulnerability in Zeroshell allows remote attackers to inject and execute arbitrary commands on the host operating system. The vulnerability is found in the parameter StartSessionSubmit of the CGI script /cgi-bin/kerbynet. An unauthenticated attacker can exploit this by manipulating the server input through specially crafted HTTP requests. The issue arises due to insufficient validation of input parameters, where shell metacharacters are not adequately sanitized. This makes the system vulnerable to crafting inputs that lead to arbitrary command execution.
Technical details of the vulnerability reveal that it is triggered via the StartSessionSubmit parameter in HTTP requests. Attackers can utilize shell metacharacters concatenated with the %0a character to manipulate processed input. The vulnerability resides in the insufficient input validation on the server-side, allowing attackers to execute commands remotely. Attack vectors include manipulating the input to include operating system commands, potentially leading to escalated privileges. The parameter exploitation involves injecting a command payload within the input string, which bypasses regular authentication safeguards.
When exploited, this vulnerability can have severe impacts on a compromised system. Attackers may execute arbitrary commands with potentially elevated privileges, leading to unauthorized data access and system integrity loss. It can enable further exploitation, such as downloading malware, continuing network attacks, or disrupting network services. As a result, organizations could face operational disruptions, loss of sensitive data, and reputational damage. Additionally, this exposure increases the risk of attack vectors used in broader campaigns targeting critical network infrastructure.
REFERENCES