Lucene search

K
zdiAbdulAziz HaririZDI-11-118
HistoryApr 11, 2011 - 12:00 a.m.

Novell ZENworks Asset Management Path Traversal File Overwrite Remote Code Execution Vulnerability

2011-04-1100:00:00
AbdulAziz Hariri
www.zerodayinitiative.com
9

0.903 High

EPSS

Percentile

98.8%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Asset Management. Authentication is not required to exploit this vulnerability. The specific flaw exists within a servlet provided within the Novell Zenworks distribution for uploading files. When processing the path name for the file, the servlet will allow a user to inject path traversal entities into the filename. Then, when the servlet downloads the provided file, the destination will store it to the user-provided location. This can lead to code execution under the context of the service.

0.903 High

EPSS

Percentile

98.8%