7.8 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
0.971 High
EPSS
Percentile
99.8%
The web console for Novell ZENworks Asset Management 7.5 contains an information disclosure vulnerability. This vulnerability allows a remote attacker to read any file with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management.
The Novell ZENworks Asset Management web console is provided as a Java web application named rtrlet
. Two HandleMaintenanceCalls
, GetFile_Password
and GetConfigInfo_Password
have hard-coded credentials. GetFile_Password
allows access to any file on the filesystem and GetConfigInfo_Password
allows access to ZENworks Asset Management configuration parameters along with the back-end system’s credentials.
A full technical analysis of the vulnerability is available on Rapid7’s blog post entitled “New 0day Exploit: Novell ZENworks CVE-2012-4933 Vulnerability” and Metasploit exploit modules are publicly available.
A remote unauthenticated attacker may read any file accessible with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management.
Apply an Update
Novell has released a patch to address this vulnerability. Follow the below steps to apply the patch on a ZAM 7.5 Server.
Restrict Access
Appropriate firewall rules should be put in place so only trusted users can access the web interface.
332412
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: September 13, 2012 Updated: October 15, 2012
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 8.5 | AV:N/AC:L/Au:N/C:C/I:P/A:N |
Temporal | 8.1 | E:H/RL:W/RC:C |
Environmental | 6.1 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
Thanks to Juan Vazquez for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2012-4933 |
---|---|
Date Public: | 2012-10-15 Date First Published: |