CVE-2011-2657

Novell Zenworks Configuration Management - Path Traversal

Title source: rule

Description

Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/19718
metasploit WORKING POC NORMAL
by rgod, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/zenworks_helplauncher_exec.rb

Scores

EPSS 0.6991
EPSS Percentile 98.7%

Details

CWE
CWE-22
Status published
Products (3)
novell/zenworks_configuration_management 10.2
novell/zenworks_configuration_management 10.3
novell/zenworks_configuration_management 11 sp1
Published Jul 26, 2012
Tracked Since Feb 18, 2026