Check Point Reference: | CPAI-2014-1875 |
Date Published: | 14 Oct 2014 |
Severity: | Critical |
Last Updated: | Tuesday 14 October, 2014 |
Source: | |
Industry Reference: | CVE-2013-1349 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | openSIS 4.5 through 5.2 |
Vulnerability Description | A remote code execution vulnerability has been reported in OpenSIS. The vulnerability is due to insufficient validation of modname parameter while parsing requests to ajax.php module. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. |
SmartView Tracker will log the following entries:
Attack Name: Web Server Enforcement Violation.
Attack Information: OpenSIS ajax.php modname Code Execution