First published: Sat Nov 02 2013(Updated: )
Directory traversal vulnerability in the GetFle method in the umaninv service in Novell ZENworks Configuration Management (ZCM) 11.2.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the Filename parameter in a GetFile action to zenworks-unmaninv/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus ZENworks Configuration Management | =11.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1084 has a medium severity rating due to its ability to allow remote file access.
To remediate CVE-2013-1084, ensure that you upgrade to a patched version of Novell ZENworks Configuration Management beyond 11.2.3.
The impact of CVE-2013-1084 is that an attacker can read arbitrary files on the server, potentially leading to sensitive data exposure.
CVE-2013-1084 affects users of Novell ZENworks Configuration Management version 11.2.3.
CVE-2013-1084 is a directory traversal vulnerability that allows unauthorized file access through manipulated inputs.