Vulnerabilities > CVE-2012-4933 - Credentials Management vulnerability in Novell Zenworks Asset Management 7.5
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Metasploit
description This module exploits a hardcoded user and password for the GetConfig maintenance task in Novell ZENworks Asset Management 7.5. The vulnerability exists in the Web Console and can be triggered by sending a specially crafted request to the rtrlet component, allowing a remote unauthenticated user to retrieve the configuration parameters of Novell Zenworks Asset Managment, including the database credentials in clear text. This module has been successfully tested on Novell ZENworks Asset Management 7.5. id MSF:AUXILIARY/SCANNER/HTTP/ZENWORKS_ASSETMANAGEMENT_GETCONFIG last seen 2020-02-25 modified 2020-02-18 published 2012-10-15 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/zenworks_assetmanagement_getconfig.rb title Novell ZENworks Asset Management 7.5 Configuration Access description This module exploits a hardcoded user and password for the GetFile maintenance task in Novell ZENworks Asset Management 7.5. The vulnerability exists in the Web Console and can be triggered by sending a specially crafted request to the rtrlet component, allowing a remote unauthenticated user to retrieve a maximum of 100_000_000 KB of remote files. This module has been successfully tested on Novell ZENworks Asset Management 7.5. id MSF:AUXILIARY/SCANNER/HTTP/ZENWORKS_ASSETMANAGEMENT_FILEACCESS last seen 2020-06-04 modified 2020-02-18 published 2012-10-15 references reporter Rapid7 source https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/zenworks_assetmanagement_fileaccess.rb title Novell ZENworks Asset Management 7.5 Remote File Access
Nessus
NASL family | CGI abuses |
NASL id | NOVELL_ZENWORKS_ASSET_MANAGEMENT_ARBITRARY_INFORMATION_DISCLOSURE.NASL |
description | The remote host has a version of Novell ZENworks Asset Management that is affected by an arbitrary information disclosure vulnerability. The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 62704 |
published | 2012-10-25 |
reporter | This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/62704 |
title | Novell ZENworks Asset Management rtrlet Component GetFile_Password Method Hardcoded Credentials Information Disclosure |
code |
|
References
- http://www.kb.cert.org/vuls/id/332412
- http://www.kb.cert.org/vuls/id/332412
- http://www.securitytracker.com/id?1027682
- http://www.securitytracker.com/id?1027682
- https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks
- https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79252
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79252