Advisory Details

January 12th, 2010

Novell ZENworks Asset Management docfiledownload Remote SQL Injection Vulnerability

ZDI-10-003
ZDI-CAN-457

CVE ID
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Novell
AFFECTED PRODUCTS Zenworks
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['8026']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Asset Management. Authentication is not required to exploit this vulnerability.

The specific flaw exists due to insufficient sanity checks on the documentID parameter to the docfiledownload component. A carefully crafted parameter can result in direct SQL access to the underlying SQL Server database which can be further leveraged by an attacker to potentially execute arbitrary code.

ADDITIONAL DETAILS Novell has issued an update to correct this vulnerability. More details can be found at:
http://www.novell.com/support/viewContent.do?externalId=7005128&sliceId=1
DISCLOSURE TIMELINE
  • 2009-03-26 - Vulnerability reported to vendor
  • 2010-01-12 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES