Vulnerability Name: | CVE-2011-0549 (CCN-68428) | ||||||||
Assigned: | 2011-07-07 | ||||||||
Published: | 2011-07-07 | ||||||||
Updated: | 2017-08-17 | ||||||||
Summary: | SQL injection vulnerability in forget.php in the management GUI in Symantec Web Gateway 4.5.x allows remote attackers to execute arbitrary SQL commands via the username parameter. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-89 | ||||||||
Vulnerability Consequences: | Data Manipulation | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-0549 Source: CCN Type: SA45146 Symantec Web Gateway Management Interface "username" SQL Injection Vulnerability Source: SECUNIA Type: Vendor Advisory 45146 Source: SECTRACK Type: UNKNOWN 1025753 Source: CCN Type: OSVDB ID: 73658 Symantec Web Gateway forget.php username Parameter SQL Injection Source: BID Type: UNKNOWN 48318 Source: CCN Type: BID-48318 Symantec Web Gateway Management GUI 'forget.php' SQL Injection Vulnerability Source: CCN Type: SYM11-008 Symantec Web Gateway Blind SQL Injection Source: CONFIRM Type: UNKNOWN http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110707_00 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-11-233/ Source: XF Type: UNKNOWN symantec-web-gui-sql-injection(68428) Source: XF Type: UNKNOWN symantec-web-gui-sql-injection(68428) Source: CCN Type: ZDI-11-233 Symantec Web Gateway forget.php SQL Injection Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |