First published: Wed Aug 09 2017(Updated: )
Directory traversal vulnerability in the doPost method of the Rtrlet class in Novell ZENworks Configuration Management (ZCM) allows remote attackers to upload and execute arbitrary files via unspecified vectors.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus ZENworks Configuration Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0781 is considered to be of moderate severity due to its potential impact on security and system integrity.
To fix CVE-2015-0781, it is recommended to update to the latest version of Novell ZENworks Configuration Management that addresses the vulnerability.
CVE-2015-0781 is classified as a directory traversal vulnerability.
Organizations using Novell ZENworks Configuration Management are affected by CVE-2015-0781.
The potential impacts of CVE-2015-0781 include remote file uploads and execution of arbitrary files, which could lead to system compromise.