Vulnerability Name:

CVE-2013-1080 (CCN-83027)

Assigned:2013-03-22
Published:2013-03-22
Updated:2013-12-13
Summary:The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 before 11.2.4 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-287
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-1080

Source: CCN
Type: SA52784
Novell ZENworks Configuration Management Control Center Arbitrary File Upload Vulnerability

Source: EXPLOIT-DB
Type: UNKNOWN
24938

Source: CCN
Type: Novell Document ID: 7011812
ZCC File Upload Remote Code Execution Vulnerability

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/kb/doc.php?id=7011812

Source: CONFIRM
Type: UNKNOWN
http://www.novell.com/support/kb/doc.php?id=7012027

Source: CCN
Type: BID-58668
Novell ZENworks Control Center Remote Execution Remote Code Execution Vulnerability

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-13-049/

Source: XF
Type: UNKNOWN
zenworks-control-center-dir-trav(83027)

Source: CCN
Type: Packet Storm Security [04-02-2013]
Novell ZENworks Configuration Management Remote Execution

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [04-08-2013]

Source: CCN
Type: ZDI-13-049
Novell ZENworks Control Center File Upload Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:zenworks_configuration_management:10.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell zenworks configuration management 10.3
    novell zenworks configuration management 11.2
    novell zenworks configuration management 10.3.1
    novell zenworks configuration management 10.3.2
    novell zenworks configuration management 10.3
    novell zenworks configuration management 10.3.3
    novell zenworks configuration management 11
    novell zenworks configuration management 11.1
    novell zenworks configuration management 11.1a