Vulnerability Name: | CVE-2012-0297 (CCN-75731) | ||||||||
Assigned: | 2012-05-17 | ||||||||
Published: | 2012-05-17 | ||||||||
Updated: | 2017-12-05 | ||||||||
Summary: | The management GUI in Symantec Web Gateway 5.0.x before 5.0.3 does not properly restrict access to application scripts, which allows remote attackers to execute arbitrary code by (1) injecting crafted data or (2) including crafted data. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2012-0297 Source: CCN Type: SA49216 Symantec Web Gateway Multiple Vulnerabilities Source: CCN Type: OSVDB ID: 82023 Symantec Web Gateway /spywall/releasenotes.php relfile Parameter Remote File Inclusion Source: CCN Type: OSVDB ID: 82925 Symantec Web Gateway /spywall/ipchange.php exec() Call Remote File Inclusion Source: CCN Type: OSVDB ID: 82926 Symantec Web Gateway network.php exec() Call Remote File Inclusion Source: CCN Type: OSVDB ID: 82927 Symantec Web Gateway /spywall/download_file.php Arbitrary File Access Source: CCN Type: OSVDB ID: 83402 Symantec Web Gateway spywall/adminConfig.php Remote Command Execution Source: BID Type: UNKNOWN 53444 Source: CCN Type: BID-53444 Symantec Web Gateway Remote Shell Command Execution Vulnerability Source: CCN Type: SYM12-006 Symantec Web Gateway Multiple Security Issues Source: CONFIRM Type: Vendor Advisory http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00 Source: XF Type: UNKNOWN symantec-web-file-include(75731) Source: XF Type: UNKNOWN symantec-web-file-include(75731) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [05-26-2012] Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [05-28-2012] Source: CCN Type: ZDI-12-090 Symantec Web Gateway Shell Command Injection Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |