First published: Thu Mar 23 2017(Updated: )
The certificate upload feature in iManager in NetIQ Access Manager 4.1 before 4.1.2 Hot Fix 1 and 4.2 before 4.2.2 could be used to upload JSP pages that would be executed as the iManager user, allowing code execution by logged-in remote users.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus NetIQ Access Manager | =4.1 | |
Micro Focus NetIQ Access Manager | =4.1-sp1 | |
Micro Focus NetIQ Access Manager | =4.1-sp2 | |
Micro Focus NetIQ Access Manager | =4.2 | |
Micro Focus NetIQ Access Manager | =4.2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5750 has a high severity rating due to the potential for remote code execution.
To fix CVE-2016-5750, upgrade to NetIQ Access Manager version 4.1.2 Hot Fix 1 or 4.2.2.
CVE-2016-5750 affects users of NetIQ Access Manager versions 4.1 and 4.2 prior to specified updates.
CVE-2016-5750 can be exploited to allow logged-in remote users to execute arbitrary JSP code.
The impact of CVE-2016-5750 includes unauthorized code execution which can compromise system integrity.