Symantec Web Gateway < 5.2.5 Management Console Command Injection (SYM16-017)

high Nessus Plugin ID 94052

Synopsis

A web security application hosted on the remote web server is affected by a command injection vulnerability.

Description

According to its self-reported version number, the Symantec Web Gateway application hosted on the remote web server is prior to 5.2.5.
It is, therefore, affected by a flaw in the web-based management console interface, specifically within the /spywall/new_whitelist.php script, due to improper whitelist validation checks. An authenticated, remote attacker can exploit this, via a specially crafted request, to make unauthorized whitelist entries and to execute arbitrary commands with 'root' privileges.

Solution

Upgrade to Symantec Web Gateway version 5.2.5 or later.

See Also

http://www.nessus.org/u?a6525a2c

http://www.nessus.org/u?5a894618

Plugin Details

Severity: High

ID: 94052

File Name: symantec_web_gateway_sym16-017.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 10/13/2016

Updated: 11/14/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2016-5313

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:web_gateway

Required KB Items: installed_sw/symantec_web_gateway

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 8/2/2016

Vulnerability Publication Date: 10/5/2016

Exploitable With

Core Impact

Elliot (Symantec Web Gateway 5.2.2 RCE)

Reference Information

CVE: CVE-2016-5313

BID: 93284

IAVA: 2016-A-0283