CVE-2015-0779
Published Jun 7, 2015
Last updated a year ago
Overview
- Description
- Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.
- Source
- security@opentext.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98942F6C-330F-459A-B2B4-72572DB4070E" }, { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A93DBC3-5C82-4396-B3D0-F32B219E2DE0" }, { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C0BAB94-6521-4B57-9E56-A57BA5E20C24" }, { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "128BDD11-1B9A-454E-9EE1-79AF9C47D945" }, { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6450243-FD92-493F-9EE8-8742BD4E9B8D" }, { "criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89A24691-061A-4C04-BB11-084BC08258AC" } ], "operator": "OR" } ] } ]