First published: Sat Dec 14 2013(Updated: )
McAfee Email Gateway 7.6 allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the value attribute in a (1) TestFile XML element or the (2) hostname. NOTE: this issue can be combined with CVE-2013-7092 to allow remote attackers to execute commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Email Gateway | =7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7103 is classified with a high severity due to its potential for remote command execution.
To mitigate CVE-2013-7103, ensure that you apply the latest security patches provided by McAfee for Email Gateway 7.6.
The impact of CVE-2013-7103 allows an authenticated attacker to execute arbitrary commands on the vulnerable system.
CVE-2013-7103 affects McAfee Email Gateway version 7.6 used by organizations for email security.
Exploitation of CVE-2013-7103 can involve using shell metacharacters in specific XML elements to gain command execution capabilities.