Symantec Data Center Security Server SQLi (SYM15-001)

medium Nessus Plugin ID 81549

Synopsis

The remote host is affected by a SQL injection vulnerability.

Description

The remote Symantec Data Center Security Server running on the remote host is affected by a SQL injection vulnerability in the '/sis-ui/authenticate' script on the web console interface. A remote attacker, using a crafted HTTP request, can exploit this to execute SQL queries, allowing the disclosure or modification of arbitrary data.

Solution

Upgrade to Symantec Data Center Security version 6.0 MP1, and apply the protection policy modifications described in the vendor advisory.

See Also

http://www.nessus.org/u?0364a137

Plugin Details

Severity: Medium

ID: 81549

File Name: symantec_dcs_cve_2014_7289.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2/26/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2014-7289

Vulnerability Information

CPE: cpe:/a:symantec:critical_system_protection

Required KB Items: installed_sw/Symantec Data Center Security Server Console

Exploit Available: true

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 1/19/2015

Vulnerability Publication Date: 1/19/2015

Reference Information

CVE: CVE-2014-7289

BID: 72092