Accellion FTA getStatus verify_oauth_token Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 13 Jul 2015.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a metacharacter shell injection vulnerability in the Accellion File Transfer appliance. This vulnerability is triggered when a user-provided 'oauth_token' is passed into a system() call within a mod_perl handler. This Metasploit module exploits the '/tws/getStatus' endpoint. Other vulnerable handlers include '/seos/find.api', '/seos/put.api', and /seos/mput.api'. This issue was confirmed on version FTA_9_11_200, but may apply to previous versions as well. This issue was fixed in software update FTA_9_11_210.

    Continue reading...
     

Share This Page

Loading...