Page 4 of 16 results (0.003 seconds)

CVSS: 10.0EPSS: 88%CPEs: 3EXPL: 0

Directory traversal vulnerability in an unspecified servlet in the Inventory component in ZENworks Asset Management (ZAM) in Novell ZENworks Configuration Management 10.3 before 10.3.2, and 11, allows remote attackers to overwrite files, and subsequently execute arbitrary code, via directory traversal sequences in a filename field in an upload request. Vulnerabilidad de salto de directorio en Componente de inventario en ZENworks Asset Management en Novell ZENworks Configuration Management v10.3 anteriores a v10.3.2 y v11, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres .. (punto punto) en el campo nombre de fichero en una petición de subida de ficheros. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Asset Management. Authentication is not required to exploit this vulnerability. The specific flaw exists within a servlet provided within the Novell Zenworks distribution for uploading files. • http://secunia.com/advisories/44120 http://securityreason.com/securityalert/8207 http://securitytracker.com/id?1025313 http://www.novell.com/support/viewContent.do?externalId=7007841 http://www.securityfocus.com/archive/1/517425/100/0/threaded http://www.securityfocus.com/bid/47295 http://www.vupen.com/english/advisories/2011/0917 http://zerodayinitiative.com/advisories/ZDI-11-118 https://exchange.xforce.ibmcloud.com/vulnerabilities/66656 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •