scripts/license.pl in Veritas NetBackup Appliance 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, 2.7.x through 2.7.3, and 3.0.x allow remote attackers to execute arbitrary commands via shell metacharacters in the hostName parameter to appliancews/getLicense.
References
Link | Resource |
---|---|
https://www.veritas.com/support/en_US/article.000116055 | Mitigation Patch Vendor Advisory |
https://www.veritas.com/content/support/en_US/security/VTS16-002.html | Vendor Advisory |
http://www.securityfocus.com/bid/94384 | Third Party Advisory VDB Entry |
http://www.sec-1.com/blog/2016/veritas-netbackup-appliance-unauthenticated-remote-command-execution | Third Party Advisory |
http://www.securitytracker.com/id/1037555 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-01-04 13:59
Updated : 2017-07-26 18:29
NVD link : CVE-2016-7399
Mitre link : CVE-2016-7399
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
veritas
- netbackup_appliance_firmware
- netbackup_appliance