#VU7155 Arbitrary PHP code execution in EMC Avamar


Published: 2017-06-21

Vulnerability identifier: #VU7155

Vulnerability risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-4990

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
EMC Avamar
Client/Desktop applications / Software for system administration

Vendor: Dell

Description
The vulnerability allows a remote attacker to execute PHP code on the target system.

The weakness exists due to improper validation of file extensions by the file upload feature of the system maintenance page. A remote attacker can send a specially crafted HTTP request, upload a malicious file to any directory and execute arbitrary PHP code on the vulnerable system.

Mitigation
Update to version 7.3.1 with Hotfix 276676 and 7.4.1 with Hotfix 279294.

Vulnerable software versions

EMC Avamar: 7.3.0-226 - 7.4.1-58


External links
http://seclists.org/bugtraq/2017/Jun/att-40/ESA-2017-054.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability