Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:NETGAIN-SEM-CE

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

NetGain Systems Enterprise Manager exec_jsp Command Execution

Release Date

2018/01/16

Update Number

3026

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: NetGain Systems Enterprise Manager exec_jsp Command Execution


This signature detects attempts to exploit a known vulnerability in NetGain Systems Enterprise Manager. Successful exploitation could result in arbitrary command execution under the context of Administrator.

Extended Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.tools.exec_jsp servlet, which listens on TCP port 8081 by default. When parsing the command parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5193.

Affected Products

  • Netgain-systems enterprise_manager 7.2.730

References

  • CVE: CVE-2017-16602

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out