Lucene search

K
saintSAINT CorporationSAINT:B81A2A5C39F13AE0BC3923A2FD819400
HistoryMay 03, 2013 - 12:00 a.m.

Novell ZENworks Control Center file upload vulnerability

2013-05-0300:00:00
SAINT Corporation
download.saintcorporation.com
12

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.869

Percentile

98.6%

Added: 05/03/2013
CVE: CVE-2013-1080
BID: 58668
OSVDB: 91627

Background

Novell ZENworks Configuration Management is an IT desktop computer management suite that provides the ability to install, configure and administer desktop computers from a centralized location. The product is based on a client/server architecture.

Problem

The ZENworks Configuration Management Control Center does not sufficiently enforce authentication for file uploads, and is also affected by a directory traversal vulnerability. A remote attacker could execute arbitrary commands by exploiting these two vulnerabilities together.

Resolution

Apply the appropriate patch referenced in Novell Knowledge Base document 7011812.

References

<http://www.zerodayinitiative.com/advisories/ZDI-13-049/&gt;

Limitations

Exploit works on Novell ZENworks Configuration Management 11 SP2 on Windows Server 2003 SP2 English (DEP OptOut) and Microsoft Windows Server 2008 SP2 (DEP OptOut). Exploit also works on Novell ZENworks Configuration Management Appliance 11 SP2 on SUSE Linux Enterprise Server 11 (x86_64) SP1.

Exploit requires the IO::Socket::SSL Perl module to be installed on the SAINTexploit host.

Platforms

Windows
Linux

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.869

Percentile

98.6%