First published: Wed Apr 11 2012(Updated: )
The xplat agent in Novell ZENworks Configuration Management (ZCM) 10.3.x before 10.3.4 and 11.x before 11.2 enables the HTTP TRACE method, which might make it easier for remote attackers to conduct cross-site tracing (XST) attacks via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus ZENworks Configuration Management | =10.3 | |
Micro Focus ZENworks Configuration Management | =10.3.1 | |
Micro Focus ZENworks Configuration Management | =10.3.2 | |
Micro Focus ZENworks Configuration Management | =10.3.3 | |
Micro Focus ZENworks Configuration Management | =11 | |
Micro Focus ZENworks Configuration Management | =11.1 | |
Micro Focus ZENworks Configuration Management | =11.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2223 is classified as a medium severity vulnerability due to its potential to allow cross-site tracing attacks.
To fix CVE-2012-2223, update your Novell ZENworks Configuration Management software to version 10.3.4 or later, or to version 11.2 or later.
CVE-2012-2223 affects Novell ZENworks Configuration Management versions 10.3.x before 10.3.4 and 11.x before 11.2.
CVE-2012-2223 relates to vulnerabilities in the xplat agent due to the enabling of the HTTP TRACE method.
Yes, CVE-2012-2223 can lead to cross-site tracing (XST) attacks, which could compromise user sessions.