Symantec ProxySG 6.5 < 6.5.10.15 / 6.6 < 6.7.4.2 XSS and Information Disclosure Vulnerabilities (SA1472)

medium Nessus Plugin ID 128329

Synopsis

The remote device is affected by multiple vulnerabilities.

Description

The self-reported SGOS version installed on the remote Symantec ProxySG device is 6.5.x prior to 6.5.10.15 or 6.6.x prior to 6.7.4.2. It is, therefore, affected by the following vulnerabilities:

- A cross-site scripting (XSS) vulnerability in ProxySG FTP proxy WebFTP mode.
An authenticated, remote attacker can exploit this, by injecting malicious JavaScript code in ProxySG's web listing of a remote FTP server. (CVE-2018-18370)

- An information disclosure vulnerability exists in ProxySG FTP proxy WebFTP mode.
An authenticated, remote attacker can exploit this, via intercepting FTP connections where a user accesses an FTP server, to obtain plaintext authentication credentials. (CVE-2018-18371)

Solution

Upgrade to Symantec ProxySG SGOS version 6.5.10.15, 6.7.4.2 or later.

See Also

https://support.symantec.com/us/en/article.symsa1472.html

https://support.symantec.com/us/en/article.prod1629.html

Plugin Details

Severity: Medium

ID: 128329

File Name: symantec_proxy_sg_sa1472.nasl

Version: 1.4

Type: local

Family: Firewalls

Published: 8/30/2019

Updated: 5/19/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2018-18370

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2018-18371

Vulnerability Information

CPE: x-cpe:/h:symantec:proxysg

Required KB Items: Host/BlueCoat/ProxySG/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 12/19/2018

Vulnerability Publication Date: 12/19/2018

Reference Information

CVE: CVE-2018-18370, CVE-2018-18371

IAVA: 2019-A-0311