|Check Point Reference:||CPAI-2019-2436|
|Date Published:||16 Feb 2021|
|Last Updated:||16 Feb 2021|
|Protection Provided by:||
|Who is Vulnerable?||Soabase Exhibitor 1.7.1 and prior|
|Vulnerability Description||A command injection vulnerability exists in Soabase Exhibitor, an open source project from Netflix. The vulnerability is due to improper validation of user-supplied input in the Config tab of Exhibitor web interface. A remote unauthenticated attacker can exploit the vulnerability by sending crafted requests to the target server.|
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Server Enforcement Violation.
Attack Information: Soabase Exhibitor UI Config Command Injection (CVE-2019-5029)