Novell ZENworks Configuration Management < 11.2.3a Monthly Update 1 Multiple Vulnerabilities (credentialed check)

This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.


Synopsis :

The remote host has an application that is affected by multiple
vulnerabilities.

Description :

The remote host has a version of Novell ZENworks Configuration
Management installed prior to 11.2.3a Monthly Update 1. It is,
therefore, affected by the following vulnerabilities:

- An open redirect vulnerability exists on the ZENworks
Control Center login page due to improper validation of
the 'fwdToURL' parameter. (CVE-2013-1093)

- The ZENworks Control Center Login.jsp script is affected
by a cross-site scripting vulnerability that exists due
to improper validation on the 'language' parameter.
(CVE-2013-1094)

- A cross-site scripting vulnerability exists due to
improper validation of input when handling 'onError'
events. (CVE-2013-1095)

- A cross-site scripting vulnerability exists due to
improper validation of input when handling frame tag
'onload' events. (CVE-2013-1097)

See also :

http://www.novell.com/support/kb/doc.php?id=7012025
http://www.novell.com/support/kb/doc.php?id=7012499
http://www.novell.com/support/kb/doc.php?id=7012501
http://www.novell.com/support/kb/doc.php?id=7012500
http://www.novell.com/support/kb/doc.php?id=7012502

Solution :

Upgrade to Novell ZENworks 11.2.3a Monthly Update 1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 66913 ()

Bugtraq ID: 60318
60319
60320
60322

CVE ID: CVE-2013-1093
CVE-2013-1094
CVE-2013-1095
CVE-2013-1097

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now