#VU17356 OS Command Injection in ZenLoad Balancer


Published: 2021-06-17

Vulnerability identifier: #VU17356

Vulnerability risk: High

CVSSv3.1: 8.2 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-7301

CWE-ID: CWE-78

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
ZenLoad Balancer
Client/Desktop applications / Other client software

Vendor: Zevenet

Description

The vulnerability allows a remote authenticated attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote authenticated attacker can inject arbitrary OS commands via shell metacharacters in the index.cgi?action=View_Cert certname parameter to execute arbitrary code with root privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ZenLoad Balancer: 3.10.1


External links
http://code610.blogspot.com/2019/01/rce-in-zenload-balancer.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability