Vulnerability CVE-2010-4229


Published: 2011-04-18   Modified: 2012-02-13

Description:
Directory traversal vulnerability in an unspecified servlet in the Inventory component in ZENworks Asset Management (ZAM) in Novell ZENworks Configuration Management 10.3 before 10.3.2, and 11, allows remote attackers to overwrite files, and subsequently execute arbitrary code, via directory traversal sequences in a filename field in an upload request.

See advisories in our WLB2 database:
Topic
Author
Date
High
Novell ZENworks Asset Management Path Traversal File Overwrite Remote Code Execution Vulnerability
ZDI
20.04.2011

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Novell -> Zenworks configuration management 

 References:
http://securityreason.com/securityalert/8207
http://securitytracker.com/id?1025313
http://www.novell.com/support/viewContent.do?externalId=7007841
http://www.securityfocus.com/archive/1/517425/100/0/threaded
http://www.securityfocus.com/bid/47295
http://www.vupen.com/english/advisories/2011/0917
http://zerodayinitiative.com/advisories/ZDI-11-118/
https://exchange.xforce.ibmcloud.com/vulnerabilities/66656

Copyright 2020, cxsecurity.com

 

Back to Top