Users of ZDI-10-136 please be advised of a Remote Code Execution Vulnerability vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
ZDI-10-136: ZDI-10-136: Novell Teaming ajaxUploadImageFile Remote Code Execution Vulnerability
ZDI-10-136
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Novell Teaming. Authentication is not
required to exploit this vulnerability.
The specific flaw exists within the Tomcat server installed by default
with Teaming. The server exposes an AJAX request handler which allows a
remote user to upload an image via the upload_image_file operation. By
crafting a specially formatted filename an attacker can bypass a
name-mangling mechanism and traverse outside the intended temporary
directory. By uploading a malicious JSP document to the web directory,
an attacker can abuse this functionality to execute arbitrary code under
the context of the SYSTEM user.
-- Vendor Response:
Novell has issued an update to correct this vulnerability. More
details can be found at:
http://download.novell.com/Download?buildid=gz4IRLKEfDo~
-- Disclosure Timeline:
2010-07-19 - Vulnerability reported to vendor
2010-07-21 - Coordinated public release of advisory
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/aMh44E

No comments:
Post a Comment