Novell ZENworks Control Center File Upload Remote Code Execution

Critical Nessus Plugin ID 65722


An application on the remote host is affected by a remote code execution vulnerability.


The installed version of Novell ZENworks Control Center has a flaw with authentication checking on '/zenworks/jsp/index.jsp' that can allow a remote, unauthenticated attacker to upload arbitrary files and execute them with SYSTEM privileges.


Upgrade to ZENworks 11.2.2 and apply the interim fix, or apply 11.2.3a Monthly Update 1 for 11.2.3 installs.

See Also

Plugin Details

Severity: Critical

ID: 65722

File Name: novell_zcc_rce.nasl

Version: $Revision: 1.8 $

Type: local

Agent: windows

Family: Windows

Published: 2013/03/28

Modified: 2016/11/23

Dependencies: 58445

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:zenworks

Required KB Items: SMB/Novell/ZENworks/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/03/21

Vulnerability Publication Date: 2013/03/22

Exploitable With

CANVAS (D2ExploitPack)

Metasploit (Novell ZENworks Configuration Management Remote Execution)

Elliot (Novell ZENworks Configuration Management 11 SP2 File Upload)

Reference Information

CVE: CVE-2013-1080

BID: 58668

OSVDB: 91627