Vulnerability Note VU#332412
Novell ZENworks Asset Management 7.5 web console information disclosure vulnerability
The web console for Novell ZENworks Asset Management 7.5 contains an information disclosure vulnerability. This vulnerability allows a remote attacker to read any file with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management.
The Novell ZENworks Asset Management web console is provided as a Java web application named rtrlet. Two HandleMaintenanceCalls, GetFile_Password and GetConfigInfo_Password have hard-coded credentials. GetFile_Password allows access to any file on the filesystem and GetConfigInfo_Password allows access to ZENworks Asset Management configuration parameters along with the back-end system's credentials.
A full technical analysis of the vulnerability is available on Rapid7's blog post entitled "New 0day Exploit: Novell ZENworks CVE-2012-4933 Vulnerability" and Metasploit exploit modules are publicly available.
A remote unauthenticated attacker may read any file accessible with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management.
Apply an Update
If you cannot patch, please consider the following workarounds.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Novell, Inc.||Affected||13 Sep 2012||15 Oct 2012|
CVSS Metrics (Learn More)
Thanks to Juan Vazquez for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2012-4933
- Date Public: 15 Oct 2012
- Date First Published: 15 Oct 2012
- Date Last Updated: 01 Nov 2012
- Document Revision: 20
If you have feedback, comments, or additional information about this vulnerability, please send us email.