ZENworks Configuration Management Two Vulnerabilities


Description   Two vulnerabilities have been reported in ZENworks Configuration Management, which can be exploited by malicious people to conduct session fixation attacks and disclose certain sensitive data.
1) Input passed via the "Filename" GET parameter to /zenworks-unmaninv/ is not properly verified in the "GetFle()" function within the umaninv service before being used to read files. This can be exploited to disclose the contents of arbitrary files via directory traversal sequences.
2) An error in the handling of sessions can be exploited to hijack another user's session by tricking the user into logging in after following a specially crafted link.
The vulnerabilities are reported in versions prior to 11.2.4.
     
Vulnerable Products   Vulnerable Software:
Novell ZENworks Configuration Management 11.x
     
Solution   Update to version 11.2.4.
     
CVE   CVE-2013-1084
     
References   Novell:
http://www.novell.com/support/kb/doc.php?id=7012027
http://www.novell.com/support/kb/doc.php?id=7012760
http://www.novell.com/support/kb/doc.php?id=7012808
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-13-258/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2013-10-30 

 Target Type 
Server 

 Possible exploit 
Remote