SB2019061107 - Multiple vulnerabilities in Adobe Campaign
Published: June 11, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2019-7843)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted request to the affected application and gain access to sensitive information.
2) Information exposure through externally-generated error message (CVE-ID: CVE-2019-7941)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output when displaying error message. A remote attacker can gain unauthorized access to sensitive information on the system.
3) Information exposure through externally-generated error message (CVE-ID: CVE-2019-7846)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output when handling unexpected conditions. A remote attacker can gain unauthorized access to sensitive information on the system.
4) XML External Entity injection (CVE-ID: CVE-2019-7847)
5) Improper access control (CVE-ID: CVE-2019-7848)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote attacker can gain access to potentially sensitive information.
6) Cleartext storage of sensitive information (CVE-ID: CVE-2019-7849)
7) OS Command Injection (CVE-ID: CVE-2019-7850)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to unspecified error. A remote unauthenticated attacker can execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.