ECI Blog @WordPress

Latest news from the ECI Networks Group

Vulnerability Note VU#719172 – Symantec Web Gateway

Symantec Web Gateway contains SQL injection and cross-site scripting vulnerabilities

Overview

Symantec Web Gateway 5.1.1.24, and possibly earlier versions, contains cross-site scripting and SQL injection vulnerabilities.

Description

CVE-2014-1652 – CWE-79: Improper Neutralization of Input During Web Page Generation

Symantec Web Gateway 5.1.1.24, and possibly earlier versions, contains a cross-site scripting vulnerability in the filter_date_period, variable and operator parameters of the /spywall/entSummary.php, /spywall/custom_report.php, /spywall/host_spy_report.php and /spywall/repairedclients.php pages.

CVE-2014-1651 – CWE-89: Improper Neutralization of Special Elements used in an SQL Command
Symantec Web Gateway 5.1.1.24, and possibly earlier versions, contains a SQL injection vulnerability in the hostname parameter of the clientreport.php page.

Additional details may be found in Symantec security advisory SYM14-010. The CVSS score below is for CVE-2014-1651.

Impact

A remote unauthenticated attacker may be able to inject arbitrary script or SQL commands.

Solution – Apply an Update

Symantec Web Gateway users should upgrade to 5.2.1 or later. Users can click “Check for Updates” on the Administration->Updates page to receive the fixed version. If you are unable to upgrade, please consider the following workaround.

Restrict Access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS or SQLi attacks since the attack comes as a request from a legitimate user’s host. Restricting access would prevent an attacker from accessing the web interface using stolen credentials from a blocked network location.

 

June 18, 2014 - Posted by | Alerts, NewsUpdate, Security | , , , , , , , , , , ,

Sorry, the comment form is closed at this time.