Plattform
other
Komponente
netgain-em-plus
Behoben in
10.1.69
CVE-2019-25468 is a critical Remote Code Execution (RCE) vulnerability discovered in NetGain EM Plus. This vulnerability allows unauthenticated attackers to execute arbitrary system commands, potentially leading to complete system compromise. It affects versions 10.1.68–10.1.68, and a patch is available from the vendor.
The impact of CVE-2019-25468 is severe. An attacker can exploit this vulnerability to execute arbitrary code on the server hosting NetGain EM Plus, effectively gaining complete control of the system. This could involve data theft, modification, or deletion, as well as the installation of malware or the use of the compromised system as a launchpad for further attacks against the internal network. The lack of authentication required for exploitation significantly broadens the attack surface, making it accessible to a wide range of threat actors. This vulnerability shares similarities with other web application vulnerabilities where improper input validation allows for command injection.
CVE-2019-25468 was published on 2026-03-11. Public proof-of-concept (PoC) code is likely to exist or emerge due to the vulnerability's simplicity and high impact. The EPSS score is likely to be high, indicating a significant probability of exploitation. While no active campaigns have been publicly confirmed, the ease of exploitation makes it a prime target for opportunistic attackers.
Organizations utilizing NetGain EM Plus for email management, particularly those running vulnerable versions 10.1.68–10.1.68, are at significant risk. Shared hosting environments where multiple users share the same server are especially vulnerable, as a compromised account could potentially be used to exploit this vulnerability.
• windows / other: Monitor NetGain EM Plus server logs for POST requests to script_test.jsp with unusual or suspicious content in the 'content' parameter. Use Sysinternals tools like Process Monitor to observe process creation and command-line arguments.
• linux / server: Monitor system logs (e.g., /var/log/syslog, /var/log/auth.log) for unusual process executions or command-line activity related to the NetGain EM Plus installation directory. Use auditd to track file access and modifications.
• generic web: Use curl or wget to test the script_test.jsp endpoint with a benign POST request and verify that it does not execute arbitrary commands. Examine response headers for unexpected content or errors.
disclosure
Exploit-Status
EPSS
0.29% (52% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2019-25468 is to upgrade NetGain EM Plus to a patched version as soon as possible. If immediate patching is not feasible, consider implementing temporary workarounds such as restricting access to the scripttest.jsp endpoint through a Web Application Firewall (WAF) or proxy server. Configure the WAF to block POST requests to this endpoint or to validate the 'content' parameter to prevent malicious commands from being executed. Thoroughly review and harden the NetGain EM Plus configuration to minimize the attack surface. After upgrading, confirm the vulnerability is resolved by attempting to access the scripttest.jsp endpoint with a benign POST request and verifying that no system commands are executed.
Aktualisieren Sie NetGain EM Plus auf eine korrigierte Version. Konsultieren Sie die Anbieterdokumentation oder deren Webseite für spezifische Anweisungen, wie die Aktualisierung angewendet und die Vulnerabilität gemildert werden kann.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2019-25468 is a critical Remote Code Execution vulnerability in NetGain EM Plus versions 10.1.68–10.1.68, allowing unauthenticated attackers to execute system commands.
If you are running NetGain EM Plus version 10.1.68–10.1.68, you are potentially affected by this vulnerability. Check your version and upgrade immediately.
The recommended fix is to upgrade to a patched version of NetGain EM Plus. If patching is not immediately possible, implement WAF rules to block malicious requests.
While no active campaigns have been publicly confirmed, the vulnerability's severity and ease of exploitation suggest a high risk of exploitation.
Refer to the NetGain EM Plus security advisories on their official website for the latest information and patch details.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.