Novell ZENworks Configuration Management < 11.2.4 Multiple Vulnerabilities

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server is running a configuration management
application affected by multiple vulnerabilities.

Description :

The version of Novell ZENworks Configuration Management installed on
the remote host can be tricked into disclosing any file readable by the
Novell ZENworks umaninv service, and as such it is affected by multiple
vulnerabilities :

- A directory traversal vulnerability exists that allows
any file readable by the Novell ZENworks umaniv service
to be disclosed. (CVE-2013-1084)

- An unspecified flaw in the ZENworks Control Center page
that can result in an application exception with an
unspecified impact. (CVE-2013-6345)

- An unspecified cross site request forgery flaw in the
ZENworks Control Center page. (CVE-2013-6346)

- An unspecified cross frame scripting flaw in the
ZENworks Control Center page. (CVE-2013-6344)

- An unspecified session fixation flaw in the ZENworks
Control Center page. (CVE-2013-6347)

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-258/
http://www.novell.com/support/kb/doc.php?id=7012760
http://www.novell.com/support/kb/doc.php?id=7012027

Solution :

Update to Novell ZENworks 11.2.4 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 70726 ()

Bugtraq ID: 63433
63499
63498
63497
63495

CVE ID: CVE-2013-1084
CVE-2013-6344
CVE-2013-6345
CVE-2013-6346
CVE-2013-6347