{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2012-10040","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-08-07T19:32:28.838Z","datePublished":"2025-08-11T14:56:01.862Z","dateUpdated":"2026-04-07T14:02:36.751Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","modules":["system.html page"],"product":"Openfiler","vendor":"Openfiler","versions":[{"status":"affected","version":"2.0"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:openfiler:openfiler:2*:*:*:*:*:*:*:*","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"bcoles"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Openfiler v2.x contains a command injection vulnerability in the <code>system.html</code> page. The <code>device</code> parameter is used to instantiate a <code>NetworkCard</code> object, whose constructor in <code>network.inc</code> calls <code>exec()</code> with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the <code>openfiler</code> user. Due to misconfigured <code>sudoers</code>, the <code>openfiler</code> user can escalate privileges to root via <code>sudo /bin/bash</code> without a password."}],"value":"Openfiler v2.x contains a command injection vulnerability in the system.html page. The device parameter is used to instantiate a NetworkCard object, whose constructor in network.inc calls exec() with unsanitized input. An authenticated attacker can exploit this to execute arbitrary commands as the openfiler user. Due to misconfigured sudoers, the openfiler user can escalate privileges to root via sudo /bin/bash without a password."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.4,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:02:36.751Z"},"references":[{"tags":["exploit"],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/openfiler_networkcard_exec.rb"},{"tags":["exploit"],"url":"https://www.exploit-db.com/exploits/21191"},{"tags":["product"],"url":"https://www.openfiler.com/"},{"tags":["product"],"url":"https://sourceforge.net/projects/openfiler/"},{"tags":["technical-description","exploit"],"url":"http://web.archive.org/web/20210922060411/https://itsecuritysolutions.org/2012-09-06-Openfiler-v2.x-multiple-vulnerabilities/"}],"source":{"discovery":"UNKNOWN"},"tags":["unsupported-when-assigned"],"title":"Openfiler v2.x NetworkCard Command Execution","x_generator":{"engine":"Vulnogram 0.2.0"},"datePublic":"2012-09-10T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-11T15:52:16.200279Z","id":"CVE-2012-10040","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-11T15:52:23.314Z"}}]}}