CVE-2011-2653

Loading...

General

Score:10.0/10.0
Severity:High
Category:Path Manipulation
Exploit:Available

Impact Metrics

Confidentiality:Complete
Integrity:Complete
Availability:Complete

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Published on 08/12/11 - Updated on 05/03/12

Description

Directory traversal vulnerability in the rtrlet component in Novell ZENworks Asset Management (ZAM) 7.5 allows remote attackers to execute arbitrary code by uploading an executable file.

Category: Path Manipulation

CWE-22 (Path Traversal)
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Security Notices

US National Vulnerability DatabaseCVE-2011-2653
Agence Nationale de la Sécurité des Systèmes d'Information CERTA-2011-AVI-678
Renater 2011/VULN646

Exploits

Exploit-DBEDB-20502
SecurityFocusBID-50966

Relative technologies

VendorProduct
novellzenworks_asset_management

Share this vulnerability with:

Twitter Facebook LinkedIn Mail