Overview
The web console for Novell ZENworks Asset Management 7.5 contains an information disclosure vulnerability. This vulnerability allows a remote attacker to read any file with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management.
Description
The Novell ZENworks Asset Management web console is provided as a Java web application named rtrlet. Two HandleMaintenanceCalls, GetFile_Password and GetConfigInfo_Password have hard-coded credentials. GetFile_Password allows access to any file on the filesystem and GetConfigInfo_Password allows access to ZENworks Asset Management configuration parameters along with the back-end system's credentials. A full technical analysis of the vulnerability is available on Rapid7's blog post entitled "New 0day Exploit: Novell ZENworks CVE-2012-4933 Vulnerability" and Metasploit exploit modules are publicly available. |
Impact
A remote unauthenticated attacker may read any file accessible with SYSTEM privileges and retrieve configuration parameters from ZENworks Asset Management. |
Solution
Apply an Update
If you cannot patch, please consider the following workarounds. |
Restrict Access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.5 | AV:N/AC:L/Au:N/C:C/I:P/A:N |
Temporal | 8.1 | E:H/RL:W/RC:C |
Environmental | 6.1 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Juan Vazquez for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2012-4933 |
Date Public: | 2012-10-15 |
Date First Published: | 2012-10-15 |
Date Last Updated: | 2012-11-01 16:58 UTC |
Document Revision: | 22 |