Vulnerability Description
Multiple SQL injection vulnerabilities in /admin/cgi-bin/rpc/doReport/18 in McAfee Email Gateway 7.6 allow remote authenticated users to execute arbitrary SQL commands via the (1) events_col, (2) event_id, (3) reason, (4) events_order, (5) emailstatus_order, or (6) emailstatus_col JSON keys.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mcafee | Email Gateway | 7.6 |
Related Weaknesses (CWE)
References
- http://osvdb.org/100582
- http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-ExeExploit
- http://seclists.org/fulldisclosure/2013/Dec/18Exploit
- http://www.securityfocus.com/bid/64150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90161
- http://osvdb.org/100582
- http://packetstormsecurity.com/files/124277/McAfee-Email-Gateway-7.6-Command-ExeExploit
- http://seclists.org/fulldisclosure/2013/Dec/18Exploit
- http://www.securityfocus.com/bid/64150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90161
FAQ
What is CVE-2013-7092?
CVE-2013-7092 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Multiple SQL injection vulnerabilities in /admin/cgi-bin/rpc/doReport/18 in McAfee Email Gateway 7.6 allow remote authenticated users to execute arbitrary SQL commands via the (1) events_col, (2) even...
How severe is CVE-2013-7092?
CVE-2013-7092 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7092?
Check the references section above for vendor advisories and patch information. Affected products include: Mcafee Email Gateway.