vendor:
ZENworks Configuration Management
by:
Pedro Ribeiro (pedrib@gmail.com), Agile Information Security
9.3
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: ZENworks Configuration Management
Affected Version From: Novell ZENworks Configuration Management 11.3.1
Affected Version To: Novell ZENworks Configuration Management 11.3.1
Patch Exists: YES
Related CWE: None
CPE: o:novell:zenworks_configuration_management:11.3.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2015
Remote code execution in Novell ZENworks Configuration Management 11.3.1
A remote code execution vulnerability exists in Novell ZENworks Configuration Management 11.3.1 due to improper validation of user-supplied input. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the vulnerable system.
Mitigation:
Novell has released a patch to address this vulnerability.