CVE-2016-9554
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
28/01/2017
Last modified:
20/04/2025
Description
The Sophos Web Appliance Remote / Secure Web Gateway server (version 4.2.1.3) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. These vulnerabilities occur in MgrDiagnosticTools.php (/controllers/MgrDiagnosticTools.php), in the component responsible for performing diagnostic tests with the UNIX wget utility. The application doesn't properly escape the information passed in the 'url' variable before calling the executeCommand class function ($this->dtObj->executeCommand). This function calls exec() with unsanitized user input allowing for remote command injection. The page that contains the vulnerabilities, /controllers/MgrDiagnosticTools.php, is accessed by a built-in command answered by the administrative interface. The command that calls to that vulnerable page (passed in the 'section' parameter) is: 'configuration'. Exploitation of this vulnerability yields shell access to the remote machine under the 'spiderman' user account.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sophos:web_appliance:4.2.1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://pastebin.com/UB8Ye6ZU
- http://www.securityfocus.com/bid/95858
- https://community.sophos.com/products/web-appliance/b/blog/posts/release-of-swa-version-4-3-1
- http://pastebin.com/UB8Ye6ZU
- http://www.securityfocus.com/bid/95858
- https://community.sophos.com/products/web-appliance/b/blog/posts/release-of-swa-version-4-3-1



