First published: Thu Feb 18 2016(Updated: )
The ChangePassword RPC method in Novell ZENworks Configuration Management (ZCM) 11.3 and 11.4 allows remote attackers to conduct XPath injection attacks, and read arbitrary text files, via a malformed query involving a system entity reference.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks Configuration Management | =11.3.0 | |
Novell ZENworks Configuration Management | =11.3.1 | |
Novell ZENworks Configuration Management | =11.3.2 | |
Novell ZENworks Configuration Management | =11.4.0 | |
Novell ZENworks Configuration Management | =11.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5970 has been classified as a medium severity vulnerability due to its potential for remote exploitation through XPath injection.
To fix CVE-2015-5970, it is recommended to upgrade Novell ZENworks Configuration Management to the latest version that addresses this vulnerability.
CVE-2015-5970 affects Novell ZENworks Configuration Management versions 11.3.0, 11.3.1, 11.3.2, 11.4.0, and 11.4.1.
CVE-2015-5970 allows remote attackers to conduct XPath injection attacks and potentially read arbitrary text files.
Currently, there are no documented workarounds for CVE-2015-5970, so the best approach is to apply the necessary updates.