Symantec Endpoint Protection Manager TestConnection.jsp 'Msg' Parameter XSS (SYM11-009 & SYM12-001)

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

An application hosted on the remote web server has a cross-site
scripting vulnerability.

Description :

The version of Symantec Endpoint Protection Manager on the remote web
server has a cross-site scripting (XSS) vulnerability. Input to the
'Msg' parameter of TestConnection.jsp is not properly sanitized. A
remote attacker could exploit this by tricking a user into making a
malicious request, resulting in the execution of arbitrary script
code.

This version of Endpoint Protection Manager has other XSS and cross-
site request forgery (CSRF) vulnerabilities, though Nessus has not
tested for those issues.

See also :

http://www.nessus.org/u?709cb392
http://www.nessus.org/u?40bbdaa6
http://www.nessus.org/u?52d2d503

Solution :

Upgrade to Symantec Endpoint Protection 11 RU7 / 12.1 RU1 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 57767 ()

Bugtraq ID: 48231

CVE ID: CVE-2011-0550