10
CVE-2015-0779
- EPSS 80.15%
- Published 07.06.2015 23:59:04
- Last modified 12.04.2025 10:46:40
- Source security@opentext.com
- Teams watchlist Login
- Open Login
Directory traversal vulnerability in UploadServlet in Novell ZENworks Configuration Management (ZCM) 10 and 11 before 11.3.2 allows remote attackers to execute arbitrary code via a crafted directory name in the uid parameter, in conjunction with a WAR filename in the filename parameter and WAR content in the POST data, a different vulnerability than CVE-2010-5323 and CVE-2010-5324.
Data is provided by the National Vulnerability Database (NVD)
Novell ≫ Zenworks Configuration Management Version11
Novell ≫ Zenworks Configuration Management Version11 Updatesp1
Novell ≫ Zenworks Configuration Management Version11.2
Novell ≫ Zenworks Configuration Management Version11.2.1
Novell ≫ Zenworks Configuration Management Version11.2.2
Novell ≫ Zenworks Configuration Management Version11.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 80.15% | 0.991 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.