An OS command injection vulnerability in the web administration component of Micro Focus Secure Messaging Gateway (SMG) allows a remote attacker authenticated as a privileged user to execute arbitrary OS commands on the SMG server. This can be exploited in conjunction with CVE-2018-12464 to achieve unauthenticated remote code execution. Affects Micro Focus Secure Messaging Gateway versions prior to 471. It does not affect previous versions of the product that used GWAVA product name (i.e. GWAVA 6.5).
References
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 9.1 |
References | () https://pentest.blog/unexpected-journey-6-all-ways-lead-to-rome-remote-code-execution-on-microfocus-secure-messaging-gateway/ - | |
References | () https://support.microfocus.com/kb/doc.php?id=7023133 - | |
References | () https://www.exploit-db.com/exploits/45083/ - |
07 Nov 2023, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.microfocus.com/kb/doc.php?id=7023133 - | |
References | () https://www.exploit-db.com/exploits/45083/ - | |
References | () https://pentest.blog/unexpected-journey-6-all-ways-lead-to-rome-remote-code-execution-on-microfocus-secure-messaging-gateway/ - |
Information
Published : 2018-06-29 16:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12465
Mitre link : CVE-2018-12465
CVE.ORG link : CVE-2018-12465
JSON object : View
Products Affected
microfocus
- secure_messaging_gateway