Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:NOVELL:ZENWORKS-DIR-TRVRS

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Novell ZENworks Configuration Management File Upload Directory Traversal

Release Date

2011/06/15

Update Number

1939

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Novell ZENworks Configuration Management File Upload Directory Traversal


This signature detects attempts to exploit a known vulnerability in Novell ZENworks Configuration Management. It is due to insufficient input validation within the ZENworks Server's FileUploadServlet. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the vulnerable system with the privileges of the Administrator user.

Extended Description

Novell ZENworks Configuration Management is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the 'ZenWorks' user. Successful attacks will completely compromise the affected computer. Failed attacks will likely cause denial-of-service conditions. ZENworks Configuration Management versions prior to 10.3.2 are vulnerable.

Affected Products

  • Novell ZENworks Configuration Management 10.1
  • Novell ZENworks Configuration Management 10.1.2
  • Novell ZENworks Configuration Management 10.1.2 A
  • Novell ZENworks Configuration Management 10.3
  • Novell ZENworks Configuration Management 10.3.1

References

  • BugTraq: 47295
  • CVE: CVE-2010-4229

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out