Summary
This host is running Symantec Web Gateway and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code in the context of the application, bypass certain security restrictions and conduct SQL injection attacks.
Impact Level: System/Application
Solution
Upgrade to Symantec Web Gateway version 5.0.3.18 or later, For updates refer to http://www.symantec.com/business/web-gateway
Insight
- The application improperly validates certain input to multiple scripts via the management console and can be exploited to inject arbitrary shell commands.
- An error within the authentication mechanism of the application can be exploited to bypass the authentication by modification of certain local files.
- Certain unspecified input passed to the management console is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
- The application improperly validates certain input via the management console and can be exploited to change the password of an arbitrary user of the application.
Affected
Symantec Web Gateway versions 5.0.x before 5.0.3.18
References
- http://secunia.com/advisories/50031
- http://www.exploit-db.com/exploits/20038
- http://www.exploit-db.com/exploits/20044
- http://www.exploit-db.com/exploits/20064
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20120720_00
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-2574, CVE-2012-2953, CVE-2012-2957, CVE-2012-2961, CVE-2012-2976, CVE-2012-2977 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Apache Tomcat/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshalled Object Remote Code Execution
- 68designs 68kb Multiple Remote File Include Vulnerabilities
- Athena Web Registration remote command execution flaw
- ASP-Dev XM Event Diary Multiple Vulnerabilities
- Advantech WebAccess Multiple Vulnerabilities