module
Novell ZENworks Configuration Management Remote Execution
Disclosed | Created |
---|---|
Mar 30, 2010 | May 30, 2018 |
Disclosed
Mar 30, 2010
Created
May 30, 2018
Description
This module exploits a code execution flaw in Novell ZENworks Configuration Management 10.2.0.
By exploiting the UploadServlet, an attacker can upload a malicious file outside of the TEMP directory
and then make a secondary request that allows for arbitrary code execution.
By exploiting the UploadServlet, an attacker can upload a malicious file outside of the TEMP directory
and then make a secondary request that allows for arbitrary code execution.
Author
MC mc@metasploit.com
Platform
Java,Linux,Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.