Advisory Details

May 29th, 2013

Novell ZENworks Mobile Management MDM.php Remote Code Execution Vulnerability

ZDI-13-087
ZDI-CAN-1763

CVE ID CVE-2013-1081
CVSS SCORE 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Novell
AFFECTED PRODUCTS ZENworks Mobile Management
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['12947']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Mobile Management. Authentication is not required to exploit this vulnerability.

The specific flaw exists within MDM.php, which receives a 'language' variable which later is used to include arbitrary resources from the local filesystem via require_once(). A remote attacker can abuse this to execute remote code under the context of the process running.

ADDITIONAL DETAILS Novell has issued an update to correct this vulnerability. More details can be found at:
http://www.novell.com/support/kb/doc.php?id=7011895
DISCLOSURE TIMELINE
  • 2013-02-22 - Vulnerability reported to vendor
  • 2013-05-29 - Coordinated public release of advisory
CREDIT rgod
BACK TO ADVISORIES