Novell Home

My Favorites

Close

Please to see your favorites.

ZCC File Upload Remote Code Execution Vulnerability

This document (7011812) is provided subject to the disclaimer at the end of this document.

Environment

Novell ZENworks Configuration Management 11.2
Novell ZENworks Configuration Management 10.3

Situation

A vulnerability has been identified with ZCM.  There was insufficient authentication checking on file uploads through the ZCM webserver. This could allow files to be placed on the filesystem of the underlying OS.

Resolution

 This is fixed in version 11.3 - see TID 7014213 "ZENworks Configuration Management 11.3 - update information and list of fixes" which can be found at http://www.novell.com/support/search.do?usemicrosite=true&searchString=7014213

For ZCM 11.2.3: This is fixed in version 11.2.4 - see TID 7012027 "ZENworks Configuration Management 11.2.4 - update information and list of fixes" which can be found at http://www.novell.com/support/search.do?usemicrosite=true&searchString=7012027

Workaround: if it is not possible to upgrade to ZCM 11.2.4 at this time, in the interim, Novell has made a Patch available for testing, as part of a Monthly patch update: it can be obtained at http://download.novell.com/Download?buildid=s5zcEae9xcI~ as "ZCM 11.2.3a Monthly Update 1 - see TID 7012025". This update should only be applied if the symptoms above are being experienced, and are causing problems.


For ZCM 11.2.2 Monthly Update 2: A fix for this issue is intended to be included in a future update to the product: however, in the interim, Novell has made a Patch available for testing, in the form of a Field Test File (FTF): it can be obtained at http://download.novell.com/Download?buildid=FqytscocWtM~ as "ZCM 11.2.2 MU1/MU2 fix for Server out of Sync errors - see TID 7011404 and ZCC File Upload Remote Code Execution Vulnerability - see TID 7011812". This Patch should only be applied if the symptoms above are being experienced, and are causing problems.

This Patch has had limited testing, and should not be used in a production system without first being checked in a test environment. Some Patches have specific requirements for deployment, it is very important to follow any instructions in the readme at the download site. Please report any problems encountered when using this Patch, by using the feedback link on this TID.

Status

Security Alert

Additional Information

This vulnerability has been assigned the identifier CVE-2013-1080 by the CVE database
This vulnerability was discovered by:James Burton@Insomnia Security and Provided by Tipping Point ZDI-CAN-1527:

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7011812
  • Creation Date:21-FEB-13
  • Modified Date:25-FEB-14
    • NovellZENworks Configuration Management

Did this document solve your problem? Provide Feedback