Saturday, July 24, 2010

ZDI-10-136 : Remote Code Execution Vulnerability

Users of ZDI-10-136 please be advised of a Remote Code Execution Vulnerability vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

ZDI-10-136: ZDI-10-136: Novell Teaming ajaxUploadImageFile Remote Code Execution Vulnerability

ZDI-10-136
-- Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on

vulnerable installations of Novell Teaming. Authentication is not

required to exploit this vulnerability.



The specific flaw exists within the Tomcat server installed by default

with Teaming. The server exposes an AJAX request handler which allows a

remote user to upload an image via the upload_image_file operation. By

crafting a specially formatted filename an attacker can bypass a

name-mangling mechanism and traverse outside the intended temporary

directory. By uploading a malicious JSP document to the web directory,

an attacker can abuse this functionality to execute arbitrary code under

the context of the SYSTEM user.



-- Vendor Response:

Novell has issued an update to correct this vulnerability. More

details can be found at:



http://download.novell.com/Download?buildid=gz4IRLKEfDo~



-- Disclosure Timeline:

2010-07-19 - Vulnerability reported to vendor

2010-07-21 - Coordinated public release of advisory
Read more at www.criticalwatch.com
 

No comments:

Post a Comment