This Metasploit module exploits a command injection vulnerability in Imperva SecureSphere version 13.x. The vulnerability exists in the PWS service, where Python CGIs did not properly sanitize user supplied command parameters and directly passes them to corresponding CLI utility, leading to command injection. Agent registration credential is required to exploit SecureSphere in gateway mode. This module was successfully tested on Imperva SecureSphere 13.0/13.1/13.2 in pre-ftl mode and unsealed gateway mode.
bdfbc634ef200611fefa72897a8585b4730eee313338e28e3fd534dd61610207
Imperva SecureSphere 13 suffers from a remote command execution vulnerability.
c5d956d30ecc2ae3b22184cc33a9b6d0f0aa918bffcfc329c14cae070c8785dd