Vulnerability Name:

CVE-2012-0297 (CCN-75731)

Assigned:2012-05-17
Published:2012-05-17
Updated:2017-12-05
Summary:The management GUI in Symantec Web Gateway 5.0.x before 5.0.3 does not properly restrict access to application scripts, which allows remote attackers to execute arbitrary code by (1) injecting crafted data or (2) including crafted data.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-0297

Source: CCN
Type: SA49216
Symantec Web Gateway Multiple Vulnerabilities

Source: CCN
Type: OSVDB ID: 82023
Symantec Web Gateway /spywall/releasenotes.php relfile Parameter Remote File Inclusion

Source: CCN
Type: OSVDB ID: 82925
Symantec Web Gateway /spywall/ipchange.php exec() Call Remote File Inclusion

Source: CCN
Type: OSVDB ID: 82926
Symantec Web Gateway network.php exec() Call Remote File Inclusion

Source: CCN
Type: OSVDB ID: 82927
Symantec Web Gateway /spywall/download_file.php Arbitrary File Access

Source: CCN
Type: OSVDB ID: 83402
Symantec Web Gateway spywall/adminConfig.php Remote Command Execution

Source: BID
Type: UNKNOWN
53444

Source: CCN
Type: BID-53444
Symantec Web Gateway Remote Shell Command Execution Vulnerability

Source: CCN
Type: SYM12-006
Symantec Web Gateway Multiple Security Issues

Source: CONFIRM
Type: Vendor Advisory
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00

Source: XF
Type: UNKNOWN
symantec-web-file-include(75731)

Source: XF
Type: UNKNOWN
symantec-web-file-include(75731)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-26-2012]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-28-2012]

Source: CCN
Type: ZDI-12-090
Symantec Web Gateway Shell Command Injection Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:symantec:web_gateway:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:symantec:web_gateway:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    symantec web gateway 5.0
    symantec web gateway 5.0.1
    symantec web gateway 5.0.2
    symantec web gateway 5.0