ZENworks Asset Management Bug

Wednesday, October 24, 2012 @ 05:10 PM gHale

Metasploit developers found an information leaking vulnerability in Novell ZENworks Asset Management 7.5 that allows a remote attacker to read files that have system-level privileges and extract all information stored by the application.

The web console of ZENworks Asset Management provides two maintenance calls that can work with hard-coded credentials, said Juan Vazquez from security firm Rapid7.

Java SE Zero Day Fix can Wait
Oracle Holes Exploited
New Java Flaw Affects 1 Billion
Blackhole Updates Product Offering

One of the calls allows remote attackers to gain access to the filesystem, while the other call gives details of the software’s backend database credentials in clear text.

Vazquez found the vulnerability in August and immediately wrote a Metasploit module to exploit it. He then disclosed it to Novell and US CERT, and has now published the exploit and corresponding Metasploit module.

The vulnerability currently remains unpatched and US CERT recommends users implement firewall rules that will restrict access to the web interface by unauthorized users.

Leave a Reply

You must be logged in to post a comment.