The rtrlet web application in the Web Console in Novell ZENworks Asset Management (ZAM) 7.5 uses a hard-coded username of Ivanhoe and a hard-coded password of Scott for the (1) GetFile_Password and (2) GetConfigInfo_Password operations, which allows remote attackers to obtain sensitive information via a crafted rtrlet/rtr request for the HandleMaintenanceCalls function.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1027682 | vdb entry |
https://community.rapid7.com/community/metasploit/blog/2012/10/15/cve-2012-4933-novell-zenworks | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79252 | vdb entry |
http://www.kb.cert.org/vuls/id/332412 | third party advisory us government resource |