HTTP: NetGain Systems Enterprise Manager exec_jsp Command Execution

This signature detects attempts to exploit a known vulnerability in NetGain Systems Enterprise Manager. Successful exploitation could result in arbitrary command execution under the context of Administrator.

Extended Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of NetGain Systems Enterprise Manager 7.2.730 build 1034. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the org.apache.jsp.u.jsp.tools.exec_jsp servlet, which listens on TCP port 8081 by default. When parsing the command parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of Administrator. Was ZDI-CAN-5193.

Affected Products

Netgain-systems enterprise_manager

Short Name
HTTP:NETGAIN-SEM-CE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2017-16602 Command Enterprise Execution Manager NetGain Systems exec_jsp
Release Date
01/16/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Netgain-systems

CVSS Score

6.5

Found a potential security threat?