Short Name |
APP:NOVELL:ZENWORKS-DIR-TRVRS |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Novell ZENworks Configuration Management File Upload Directory Traversal |
Release Date |
2011/06/15 |
Update Number |
1939 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Novell ZENworks Configuration Management. It is due to insufficient input validation within the ZENworks Server's FileUploadServlet. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the vulnerable system with the privileges of the Administrator user.
Novell ZENworks Configuration Management is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the 'ZenWorks' user. Successful attacks will completely compromise the affected computer. Failed attacks will likely cause denial-of-service conditions. ZENworks Configuration Management versions prior to 10.3.2 are vulnerable.