Lucene search

K
saintSAINT CorporationSAINT:C3531EE26357FAABF8C0AF2404E0F11F
HistoryMay 03, 2013 - 12:00 a.m.

Novell ZENworks Control Center file upload vulnerability

2013-05-0300:00:00
SAINT Corporation
www.saintcorporation.com
15

EPSS

0.869

Percentile

98.6%

Added: 05/03/2013
CVE: CVE-2013-1080
BID: 58668
OSVDB: 91627

Background

Novell ZENworks Configuration Management is an IT desktop computer management suite that provides the ability to install, configure and administer desktop computers from a centralized location. The product is based on a client/server architecture.

Problem

The ZENworks Configuration Management Control Center does not sufficiently enforce authentication for file uploads, and is also affected by a directory traversal vulnerability. A remote attacker could execute arbitrary commands by exploiting these two vulnerabilities together.

Resolution

Apply the appropriate patch referenced in Novell Knowledge Base document 7011812.

References

<http://www.zerodayinitiative.com/advisories/ZDI-13-049/&gt;

Limitations

Exploit works on Novell ZENworks Configuration Management 11 SP2 on Windows Server 2003 SP2 English (DEP OptOut) and Microsoft Windows Server 2008 SP2 (DEP OptOut). Exploit also works on Novell ZENworks Configuration Management Appliance 11 SP2 on SUSE Linux Enterprise Server 11 (x86_64) SP1.

Exploit requires the IO::Socket::SSL Perl module to be installed on the SAINTexploit host.

Platforms

Windows
Linux