Symantec Web Gateway forget.php Blind SQL Injection (SYM11-008)

high Nessus Plugin ID 55629

Synopsis

A web security application running on the remote host has a SQL injection vulnerability.

Description

According to its self-reported version number, the version of Symantec Web Gateway running on the remote host has a SQL injection vulnerability. Input to the 'username' parameter of the 'forget.php' script is not properly sanitized.

A remote, unauthenticated attacker could exploit this to manipulate database queries.

Solution

Upgrade to Symantec Web Gateway version 5.0.1 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-11-233/

http://www.nessus.org/u?7e6ee5f9

Plugin Details

Severity: High

ID: 55629

File Name: symantec_web_gateway_sym11-008.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 7/20/2011

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:symantec:web_gateway

Required KB Items: www/symantec_web_gateway

Exploit Ease: No exploit is required

Patch Publication Date: 7/7/2011

Vulnerability Publication Date: 7/7/2011

Reference Information

CVE: CVE-2011-0549

BID: 48318