Symantec Endpoint Protection Manager TestConnection.jsp 'Msg' Parameter XSS (SYM11-009 & SYM12-001)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.

Synopsis :

An application hosted on the remote web server is affected by a
cross-site scripting vulnerability.

Description :

The version of Symantec Endpoint Protection Manager running on the
remote web server is affected by a cross-site scripting (XSS)
vulnerability due to improper sanitization of input to the 'Msg'
parameter in the TestConnection.jsp file. An unauthenticated, remote
attacker can exploit this vulnerability by convincing a user to make a
malicious request, resulting in the execution of arbitrary script code
in the user's browser session.

This version of Endpoint Protection Manager is affected by additional
XSS and XSRF vulnerabilities; however, Nessus has not tested for

See also :

Solution :

Upgrade to Symantec Endpoint Protection Manager 11 RU7 / 12.1 RU1 or

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 57767 ()

Bugtraq ID: 48231

CVE ID: CVE-2011-0550

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now