CVE-2013-1080
Novell Zenworks Configuration Management - Authentication Bypass
Title source: ruleDescription
The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 before 11.2.4 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/24938
metasploit
WORKING POC
GREAT
by James Burton, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/zenworks_control_center_upload.rb
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
http://www.novell.com/support/kb/doc.php?id=7011812
Third Party Advisory x_refsource_misc
http://www.zerodayinitiative.com/advisories/ZDI-13-049/
Vendor Advisory x_refsource_confirm
http://www.novell.com/support/kb/doc.php?id=7012027
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/24938
Scores
EPSS
0.7292
EPSS Percentile
98.8%
Details
CWE
CWE-287
Status
published
Products (2)
novell/zenworks_configuration_management
10.3
novell/zenworks_configuration_management
11.2
Published
Mar 29, 2013
Tracked Since
Feb 18, 2026