Vulnerability Name: | CVE-2015-5692 (CCN-106414) | ||||||||
Assigned: | 2015-09-16 | ||||||||
Published: | 2015-09-16 | ||||||||
Updated: | 2016-12-22 | ||||||||
Summary: | admin_messages.php in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary code by uploading a file with a safe extension and content type, and then leveraging an improper Sudo configuration to make this a setuid-root file. | ||||||||
CVSS v3 Severity: | 8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||
CVSS v2 Severity: | 7.9 High (CVSS v2 Vector: AV:N/AC:M/Au:M/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-5692 Source: BID Type: UNKNOWN 76726 Source: SECTRACK Type: UNKNOWN 1033625 Source: CCN Type: Symantec Security Advisory SYM15-009 Symantec Web Gateway Security Management Console Multiple Issues Source: CONFIRM Type: Vendor Advisory http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150916_00 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-15-443/ Source: XF Type: UNKNOWN symantec-web-cve20155692-file-upload(106414) Source: CCN Type: ZDI-15-443 Symantec Web Gateway Arbitrary PHP File Upload Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |