Micro.Focus.Secure.Messaging.Gateway.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Micro Focus Secure Messaging Gateway.
The vulnerability is due to improper validation of SaveData parameter within manage_domains_save_data.json.php. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable application. Successful exploitation could result in remote code execution in the context of the wwwrun user.
Affected Products
Micro Focus Secure Messaging Gateway prior to July 2020 release
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://support.microfocus.com/kb/doc.php?id=7024775
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-02-01 | 17.008 | Default_action:pass:drop |
2021-01-27 | 17.006 | |
2021-01-21 | 17.005 | |
2021-01-21 | 17.004 |