Vulnerability Description
Manage::Certificates in Zen Load Balancer 3.10.1 allows remote authenticated admins to execute arbitrary OS commands via shell metacharacters in the index.cgi cert_issuer, cert_division, cert_organization, cert_locality, cert_state, cert_country, or cert_email parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zevenet | Zen Load Balancer | 3.10.1 |
Related Weaknesses (CWE)
References
- http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.htmlThird Party Advisory
- https://github.com/c610/tmp/blob/master/zenload4patreons.zipExploitThird Party Advisory
- http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.htmlThird Party Advisory
- https://github.com/c610/tmp/blob/master/zenload4patreons.zipExploitThird Party Advisory
FAQ
What is CVE-2020-11490?
CVE-2020-11490 is a vulnerability with a CVSS score of 7.2 (HIGH). Manage::Certificates in Zen Load Balancer 3.10.1 allows remote authenticated admins to execute arbitrary OS commands via shell metacharacters in the index.cgi cert_issuer, cert_division, cert_organiza...
How severe is CVE-2020-11490?
CVE-2020-11490 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11490?
Check the references section above for vendor advisories and patch information. Affected products include: Zevenet Zen Load Balancer.