Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-49r7-w8p8-xgc3

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.

Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.

EPSS

Процентиль: 99%
0.80149
Высокий

Дефекты

CWE-22

Связанные уязвимости

nvd
больше 10 лет назад

Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.

fstec
больше 10 лет назад

Уязвимость программы управления информационными системами ZENworks Configuration Management, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.80149
Высокий

Дефекты

CWE-22