ID

VAR-201509-0149


CVE

CVE-2015-5693


TITLE

Symantec Web Gateway Vulnerability in arbitrary command execution in management console running on appliance software

Trust: 0.8

sources: JVNDB: JVNDB-2015-004900

DESCRIPTION

The management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary commands via vectors related to "traffic capture.". Authentication is not required to exploit this vulnerability. The specific flaw exists within the path processing for command URLs accessed through the management port of the gateway. A crafted URL can cause the Web Gateway to execute a command that should not be available externally. An attacker can exploit this vulnerability to execute arbitrary commands under the context of root. Symantec Web Gateway (SWG) is a set of network content filtering software developed by Symantec Corporation of the United States. The software provides web content filtering, data loss prevention, and more. A security vulnerability exists in the management console of SWG appliances using software versions earlier than 5.2.2 DB 5.0.0.1277

Trust: 2.61

sources: NVD: CVE-2015-5693 // JVNDB: JVNDB-2015-004900 // ZDI: ZDI-15-444 // BID: 76731 // VULHUB: VHN-83654

AFFECTED PRODUCTS

vendor:symantecmodel:web gatewayscope:lteversion:5.2.2

Trust: 1.0

vendor:symantecmodel:web gatewayscope:ltversion:5.2.2 db 5.0.0.1277

Trust: 0.8

vendor:symantecmodel:web gatewayscope: - version: -

Trust: 0.7

vendor:symantecmodel:web gatewayscope:eqversion:5.2.2

Trust: 0.6

vendor:symantecmodel:web gatewayscope:eqversion:5.0.3

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.1

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:4.5.0.376

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:4.5

Trust: 0.3

sources: ZDI: ZDI-15-444 // BID: 76731 // JVNDB: JVNDB-2015-004900 // CNNVD: CNNVD-201509-249 // NVD: CVE-2015-5693

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5693
value: HIGH

Trust: 1.0

NVD: CVE-2015-5693
value: HIGH

Trust: 0.8

ZDI: CVE-2015-5693
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201509-249
value: HIGH

Trust: 0.6

VULHUB: VHN-83654
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5693
severity: HIGH
baseScore: 7.9
vectorString: AV:N/AC:M/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2015-5693
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-83654
severity: HIGH
baseScore: 7.9
vectorString: AV:N/AC:M/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-444 // VULHUB: VHN-83654 // JVNDB: JVNDB-2015-004900 // CNNVD: CNNVD-201509-249 // NVD: CVE-2015-5693

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-83654 // JVNDB: JVNDB-2015-004900 // NVD: CVE-2015-5693

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201509-249

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201509-249

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004900

PATCH

title:SYM15-009url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150916_00

Trust: 1.5

sources: ZDI: ZDI-15-444 // JVNDB: JVNDB-2015-004900

EXTERNAL IDS

db:NVDid:CVE-2015-5693

Trust: 3.5

db:ZDIid:ZDI-15-444

Trust: 2.4

db:BIDid:76731

Trust: 2.0

db:SECTRACKid:1033625

Trust: 1.1

db:JVNDBid:JVNDB-2015-004900

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3057

Trust: 0.7

db:CNNVDid:CNNVD-201509-249

Trust: 0.7

db:VULHUBid:VHN-83654

Trust: 0.1

sources: ZDI: ZDI-15-444 // VULHUB: VHN-83654 // BID: 76731 // JVNDB: JVNDB-2015-004900 // CNNVD: CNNVD-201509-249 // NVD: CVE-2015-5693

REFERENCES

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150916_00

Trust: 2.3

url:http://www.securityfocus.com/bid/76731

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-444/

Trust: 1.7

url:http://www.securitytracker.com/id/1033625

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5693

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5693

Trust: 0.8

url:http://www.symantec.com

Trust: 0.3

url:http://www.symantec.com/business/web-gateway

Trust: 0.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150916_00

Trust: 0.1

sources: ZDI: ZDI-15-444 // VULHUB: VHN-83654 // BID: 76731 // JVNDB: JVNDB-2015-004900 // CNNVD: CNNVD-201509-249 // NVD: CVE-2015-5693

CREDITS

Jos Wetzels of LeakFree Security

Trust: 0.9

sources: BID: 76731 // CNNVD: CNNVD-201509-249

SOURCES

db:ZDIid:ZDI-15-444
db:VULHUBid:VHN-83654
db:BIDid:76731
db:JVNDBid:JVNDB-2015-004900
db:CNNVDid:CNNVD-201509-249
db:NVDid:CVE-2015-5693

LAST UPDATE DATE

2025-04-13T23:09:47.116000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-444date:2015-09-16T00:00:00
db:VULHUBid:VHN-83654date:2016-12-22T00:00:00
db:BIDid:76731date:2015-11-03T19:14:00
db:JVNDBid:JVNDB-2015-004900date:2015-09-29T00:00:00
db:CNNVDid:CNNVD-201509-249date:2015-09-21T00:00:00
db:NVDid:CVE-2015-5693date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-444date:2015-09-16T00:00:00
db:VULHUBid:VHN-83654date:2015-09-20T00:00:00
db:BIDid:76731date:2015-09-16T00:00:00
db:JVNDBid:JVNDB-2015-004900date:2015-09-29T00:00:00
db:CNNVDid:CNNVD-201509-249date:2015-09-18T00:00:00
db:NVDid:CVE-2015-5693date:2015-09-20T20:59:08.383