Executive Summary
Summary | |
---|---|
Title | Symantec Web Gateway contains multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | VU#108471 | First vendor Publication | 2012-07-24 |
Vendor | VU-CERT | Last vendor Modification | 2012-07-24 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#108471Symantec Web Gateway contains multiple vulnerabilitiesOverviewThe Symantec Web Gateway management console is vulnerable to remote command execution, local file inclusion, arbitrary password changes, and SQL injection. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThanks to Offensive Security and Tenable Network Security for reporting these vulnerabilities. This document was written by Jared Allar. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. This product is provided subject to the Notification as indicated here: http://www.us-cert.gov/legal.html#notify |
Original Source
Url : http://www.kb.cert.org/vuls/id/108471 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-264 | Permissions, Privileges, and Access Controls |
33 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
33 % | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
SAINT Exploits
Description | Link |
---|---|
Symantec Web Gateway pbcontrol.php Command Injection | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2012-08-22 | Name : Symantec Web Gateway Password Change Security Bypass Vulnerability File : nvt/gb_symantec_web_gateway_54430.nasl |
2012-07-26 | Name : Symantec Web Gateway Remote Shell Command Execution Vulnerability File : nvt/gb_symantec_web_gateway_54426.nasl |
2012-07-24 | Name : Symantec Web Gateway Local File Manipulation Authentication Bypass Vulnerability File : nvt/gb_symantec_web_gateway_54429.nasl |
2012-07-24 | Name : Symantec Web Gateway Multiple Vulnerabilities File : nvt/gb_symantec_web_gateway_mult_vuln.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-03-15 | Symantec Web Gateway languagetest.php language parameter directory traversal ... RuleID : 29746 - Revision : 4 - Type : SERVER-WEBAPP |
2014-01-10 | Symantec Web Gateway blocked.php blind sql injection attempt RuleID : 23934 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | Symantec Web Gateway blocked.php id parameter sql injection attempt RuleID : 23784 - Revision : 5 - Type : SERVER-WEBAPP |
2014-01-10 | Symantec Web Gateway pbcontrol.php filename parameter command injection attempt RuleID : 23783 - Revision : 12 - Type : SERVER-WEBAPP |
2014-01-10 | PHP uri tag injection attempt RuleID : 23111 - Revision : 12 - Type : POLICY-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-08-06 | Name : The remote host is affected by a shell command execution vulnerability. File : symantec_web_gateway_rce.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
2012-08-06 | Name : A web security application hosted on the remote web server is affected by a S... File : symantec_web_gateway_search_sqli.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 12:07:30 |
|