Vulnerabilities
Vulnerable Software
Zenoss:  >> Zenoss Core  >> 2.5.2  Security Vulnerabilities
Zenoss Core before 4.2.5 SP161 sets an infinite lifetime for the session ID cookie, which makes it easier for remote attackers to hijack sessions by leveraging an unattended workstation, aka ZEN-12691.
CVSS Score
6.8
EPSS Score
0.007
Published
2014-12-15
Cross-site request forgery (CSRF) vulnerability in Zenoss Core through 5 Beta 3 allows remote attackers to hijack the authentication of arbitrary users for requests that trigger arbitrary code execution via a ZenPack upload, aka ZEN-15388.
CVSS Score
6.8
EPSS Score
0.003
Published
2014-12-15
Zenoss Core through 5 Beta 3 stores cleartext passwords in the session database, which might allow local users to obtain sensitive information by reading database entries, aka ZEN-15416.
CVSS Score
2.1
EPSS Score
0.001
Published
2014-12-15
Zenoss Core through 5 Beta 3 uses a weak algorithm to hash passwords, which makes it easier for context-dependent attackers to obtain cleartext values via a brute-force attack on hash values in the database, aka ZEN-15413.
CVSS Score
5.0
EPSS Score
0.003
Published
2014-12-15
Zenoss Core through 5 Beta 3 does not include the HTTPOnly flag in a Set-Cookie header for the authentication cookie, which makes it easier for remote attackers to obtain credential information via script access to this cookie, aka ZEN-10418.
CVSS Score
5.0
EPSS Score
0.006
Published
2014-12-15
The default configuration of Zenoss Core before 5 allows remote attackers to read or modify database information by connecting to unspecified open ports, aka ZEN-15408.
CVSS Score
7.5
EPSS Score
0.007
Published
2014-12-15
Zenoss Core through 5 Beta 3 does not require complex passwords, which makes it easier for remote attackers to obtain access via a brute-force attack, aka ZEN-15406.
CVSS Score
5.0
EPSS Score
0.005
Published
2014-12-15
Zenoss Core through 5 Beta 3 allows remote authenticated users to obtain sensitive (1) user account, (2) e-mail address, and (3) role information by visiting the ZenUsers (aka User Manager) page, aka ZEN-15389.
CVSS Score
4.0
EPSS Score
0.003
Published
2014-12-15
Zenoss Core through 5 Beta 3 allows remote attackers to obtain sensitive information by attempting a product-rename action with an invalid new name and then reading a stack trace, as demonstrated by internal URL information, aka ZEN-15382.
CVSS Score
5.0
EPSS Score
0.005
Published
2014-12-15
Zenoss Core through 5 Beta 3 does not properly implement the Check For Updates feature, which allows remote attackers to execute arbitrary code by (1) spoofing the callhome server or (2) deploying a crafted web site that is visited during a login session, aka ZEN-12657.
CVSS Score
9.3
EPSS Score
0.019
Published
2014-12-15


Contact Us

Shodan ® - All rights reserved