Symantec Web Gateway login.php Blind SQL Injection (SYM11-001)

high Nessus Plugin ID 55628

Synopsis

A web security application running on the remote host has a SQL injection vulnerability.

Description

According to its self-reported version number, the version of Symantec Web Gateway running on the remote host has a SQL injection vulnerability. Input to the 'USERNAME' parameter of the 'login.php' script is not properly sanitized.

A remote, unauthenticated attacker could exploit this to manipulate database queries.

Solution

Upgrade to Symantec Web Gateway version 4.5.0.376 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-11-013/

http://www.nessus.org/u?454d6e47

Plugin Details

Severity: High

ID: 55628

File Name: symantec_web_gateway_sym11-001.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 7/20/2011

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:symantec:web_gateway

Required KB Items: www/symantec_web_gateway

Exploit Ease: No exploit is required

Patch Publication Date: 1/12/2011

Vulnerability Publication Date: 1/12/2011

Reference Information

CVE: CVE-2010-0115

BID: 45742