CVE-2013-1080

Novell Zenworks Configuration Management - Authentication Bypass

Title source: rule
STIX 2.1

Description

The web server in Novell ZENworks Configuration Management (ZCM) 10.3 and 11.2 before 11.2.4 does not properly perform authentication for zenworks/jsp/index.jsp, which allows remote attackers to conduct directory traversal attacks, and consequently upload and execute arbitrary programs, via a request to TCP port 443.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/24938
metasploit WORKING POC GREAT
by James Burton, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/zenworks_control_center_upload.rb

References (4)

Core 4
Core References
Vendor Advisory x_refsource_confirm
http://www.novell.com/support/kb/doc.php?id=7011812
Third Party Advisory x_refsource_misc
http://www.zerodayinitiative.com/advisories/ZDI-13-049/
Vendor Advisory x_refsource_confirm
http://www.novell.com/support/kb/doc.php?id=7012027
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/24938

Scores

EPSS 0.7292
EPSS Percentile 98.8%

Details

CWE
CWE-287
Status published
Products (2)
novell/zenworks_configuration_management 10.3
novell/zenworks_configuration_management 11.2
Published Mar 29, 2013
Tracked Since Feb 18, 2026