RULE(RULE ID:323859)

Rule General Information
Release Date: 2019-11-29
Rule Name: Accellion FTA getStatus verify_oauth_token Command Execution Vulnerability (CVE-2015-2857)
Severity:
CVE ID:
Rule Protection Details
Description: Accellion File Transfer Appliance before FTA_9_11_210 allows remote attackers to execute arbitrary code via shell metacharacters in the oauth_token parameter.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: ExploitDB:37597
http://packetstormsecurity.com/files/132665/Accellion-FTA-getStatus-verify_oauth_token-Command-Execution.html
http://www.rapid7.com/db/modules/exploit/linux/http/accellion_fta_getstatus_oauth
https://community.rapid7.com/community/metasploit/blog/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://www.accellion.com/