Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within exec.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current user. Was ZDI-CAN-4749.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgain-Systems | Enterprise Manager | < 7.2.766 |
Related Weaknesses (CWE)
References
- https://www.tenable.com/security/research/tra-2018-02Third Party Advisory
- https://zerodayinitiative.com/advisories/ZDI-17-950Third Party AdvisoryVDB Entry
- https://www.tenable.com/security/research/tra-2018-02Third Party Advisory
- https://zerodayinitiative.com/advisories/ZDI-17-950Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-16608?
CVE-2017-16608 is a vulnerability with a CVSS score of 9.8 (CRITICAL). This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specif...
How severe is CVE-2017-16608?
CVE-2017-16608 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-16608?
Check the references section above for vendor advisories and patch information. Affected products include: Netgain-Systems Enterprise Manager.