CVE-2012-4933
Novell ZENworks Asset Management 7.5 - Info Disclosure
Title source: llmDescription
The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
Exploits (2)
metasploit
WORKING POC
by juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb
metasploit
WORKING POC
by juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/zenworks_assetmanagement_fileaccess.rb
References (4)
Scores
EPSS
0.7702
EPSS Percentile
99.0%
Details
CWE
CWE-255
Status
published
Products (1)
novell/zenworks_asset_management
7.5
Published
Oct 20, 2012
Tracked Since
Feb 18, 2026