vendor:
Symantec Encryption Gateway
by:
Paul Craig
8.8
CVSS
HIGH
Remote Command Injection
78
CWE
Product Name: Symantec Encryption Gateway
Affected Version From: < 3.2.0 MP6
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:symantec:symantec_encryption_gateway
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014
Symantec Encryption Management Server – Remote Command Injection
Remote Command Injection vulnerabilities occur when user supplied input is used directly as a command line argument to a fork(), execv() or a CreateProcessA() function. It was found that the binary /usr/bin/pgpsysconf calls the binary /usr/bin/pgpbackup with unfiltered user supplied input when restoring a Database Backup from the Symantec Encryption Management Web Interface. The user supplied 'filename' value is used directly as a command argument, and can be concatenated to include additional commands with the use of the pipe character. This can allow a lower privileged Administrator to compromise the Encryption Management Server.
Mitigation:
Upgrade to Symantec Encryption Gateway version 3.2.0 MP6 or later.