Summary
This host is running Symantec Messaging Gateway and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow attackers to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Impact Level: Application
Solution
Upgrade to Symantec Messaging Gateway 10.5.2 or later, For updates refer to http://www.symantec.com/messaging-gateway
Insight
The flaw is due to input passed via the 'displayTab' GET parameter to /brightmail/setting/compliance/DlpConnectFlow$view.flo is not properly sanitised before being returned to the user.
Affected
Symantec Messaging Gateway 10.x before 10.5.2
Detection
Get the installed version of Symantec Messaging Gateway with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2014-1648 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Alt-N WebAdmin Remote Source Code Information Disclosure Vulnerability
- Apache Continuum Cross Site Scripting Vulnerability
- /doc directory browsable ?
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
- Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability