Directory traversal vulnerability in an unspecified servlet in the Inventory component in ZENworks Asset Management (ZAM) in Novell ZENworks Configuration Management 10.3 before 10.3.2, and 11, allows remote attackers to overwrite files, and subsequently execute arbitrary code, via directory traversal sequences in a filename field in an upload request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/44120 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8207 - | |
References | () http://securitytracker.com/id?1025313 - | |
References | () http://www.novell.com/support/viewContent.do?externalId=7007841 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/517425/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/47295 - | |
References | () http://www.vupen.com/english/advisories/2011/0917 - Vendor Advisory | |
References | () http://zerodayinitiative.com/advisories/ZDI-11-118/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/66656 - |
Information
Published : 2011-04-18 18:55
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4229
Mitre link : CVE-2010-4229
CVE.ORG link : CVE-2010-4229
JSON object : View
Products Affected
novell
- zenworks_configuration_management
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')