Short Name |
HTTP:MISC:ALCATEL-OMNIPCX-CE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution |
Release Date |
2011/12/15 |
Update Number |
2048 |
Supported Platforms |
di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Alcatel-Lucent OmniPCX Enterprise. A successful attack can lead to arbitrary command execution.
Alcatel-Lucent OmniPCX Enterprise is prone to a remote command-execution vulnerability because it fails to adequately sanitize user-supplied data. Attackers can exploit this issue to execute arbitrary commands with the privileges of the 'httpd' user. Successful attacks may facilitate a compromise of the application and underlying webserver; other attacks are also possible. Alcatel-Lucent OmniPCX Enterprise R7.1 and prior versions are vulnerable to this issue.