Open Redirect Vulnerability found on the ZCC login page

  • 7012499
  • 28-May-2013
  • 16-Jan-2014


Novell ZENworks Configuration Management 11.2 ZENworks Control Center - ZCC


Open Redirect vulnerability found with the ZCC login page


This is fixed in version 11.2.4 - see KB 7012027 "ZENworks Configuration Management 11.2.4 - update information and list of fixes" which can be found at

For ZCM 11.2.3a: Workaround - if it is not possible to upgrade to ZCM 11.2.4 at this time, Novell has made a Patch  available for testing, as part of a Monthly patch update: it can be obtained at as "ZCM 11.2.3a Monthly Update 1 - see TID 7012025". This update should only be applied if the symptoms above are being experienced, and are causing problems.

Please report any problems encountered when using this Patch, by using the feedback link on this TID.

Change to zcc-framework.jar was made to address the issue. The URLs for the 'fwdToURL' now only allows ZENworks URLs by checking with "/zenworks" as part of the URL.  This change will avoid the vulnerability issues by displaying the Page not found exception with the invalid URL passed in.


Security Alert

Additional Information

The Form element fwdToURL which is passing as part of the post method is used when the session times out and the user clicks a button/link that will postback, there will not be an existing session and thus a login page will be shown. This would allow someone to create a link to a specific page where a special parameter is checked: "directToPage".  If the direct parameter is on the URL, the login page is shown and then redirected to the request page ID but the fwdToURL is allowing any url which creates the vulnerability in ZCM.

assigned CVE-2013-1093