Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-5323Path Traversal in Zenworks Configuration Management

CWE-22Path Traversal4 documents4 sources
Severity
10.0CRITICALNVD
EPSS
22.9%
top 4.09%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 7
Latest updateMay 17

Description

Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 10.3 allows remote attackers to execute arbitrary code via a crafted WAR pathname in the filename parameter in conjunction with WAR content in the POST data, a different vulnerability than CVE-2010-5324.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3pg8-3336-w32h: Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 102022-05-17
CVEList
CVE-2010-5323: Directory traversal vulnerability in UploadServlet in the Remote Management component in Novell ZENworks Configuration Management (ZCM) 10 before 102015-06-07

💥Exploits & PoCs

1
Exploit-DB
Novell ZENworks Configuration Management 10.2.0 - Remote Execution (Metasploit)2010-11-22
CVE-2010-5323 — Path Traversal | cvebase