Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote malicious users to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
zenoss zenoss core 2.4.0 |
||
zenoss zenoss core 3.0.0 |
||
zenoss zenoss core 3.0.2 |
||
zenoss zenoss core 4.2.4 |
||
zenoss zenoss core 5.0.0 |
||
zenoss zenoss core 2.4.5 |
||
zenoss zenoss core 2.5.0 |
||
zenoss zenoss core 2.5.1 |
||
zenoss zenoss core 2.5.2 |
||
zenoss zenoss core |
||
zenoss zenoss core 3.1.0 |
||
zenoss zenoss core 3.2.0 |
||
zenoss zenoss core 3.2.1 |
||
zenoss zenoss core 4.2.0 |
||
zenoss zenoss core 3.0.1 |
||
zenoss zenoss core 3.0.3 |
||
zenoss zenoss core 4.2.3 |
||
zenoss zenoss core 4.2.5 |