ID

VAR-201704-0126


CVE

CVE-2016-5313


TITLE

Symantec Web Gateway In any OS Command execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-008422

DESCRIPTION

Symantec Web Gateway (SWG) before 5.2.5 allows remote authenticated users to execute arbitrary OS commands. Symantec Web Gateway is prone to a command-injection vulnerability. Successfully exploiting this issue may allow an attacker to inject arbitrary commands in the context of the affected appliance. Versions prior to Symantec Web Gateway 5.2.5 are vulnerable. Symantec Web Gateway (SWG) is a set of network content filtering software developed by Symantec Corporation of the United States. The software provides web content filtering, data loss prevention, and more. A remote attacker could exploit this vulnerability to execute operating system commands

Trust: 2.07

sources: NVD: CVE-2016-5313 // JVNDB: JVNDB-2016-008422 // BID: 93284 // VULHUB: VHN-94132 // VULMON: CVE-2016-5313

AFFECTED PRODUCTS

vendor:symantecmodel:web gatewayscope:lteversion:5.2.2

Trust: 1.0

vendor:symantecmodel:web gatewayscope:eqversion:5.2.2

Trust: 0.9

vendor:symantecmodel:web gatewayscope:ltversion:5.2.5

Trust: 0.8

vendor:symantecmodel:web gatewayscope:eqversion:5.2.1

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.2

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.1.1

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.1.0

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.3.18

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.3.17

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.3

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.2.18

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.2

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0.1

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:5.0

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:4.5.0.376

Trust: 0.3

vendor:symantecmodel:web gatewayscope:eqversion:4.5

Trust: 0.3

vendor:symantecmodel:web gatewayscope:neversion:5.2.5

Trust: 0.3

sources: BID: 93284 // JVNDB: JVNDB-2016-008422 // CNNVD: CNNVD-201610-104 // NVD: CVE-2016-5313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5313
value: HIGH

Trust: 1.0

NVD: CVE-2016-5313
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-104
value: CRITICAL

Trust: 0.6

VULHUB: VHN-94132
value: HIGH

Trust: 0.1

VULMON: CVE-2016-5313
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-5313
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-94132
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5313
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-94132 // VULMON: CVE-2016-5313 // JVNDB: JVNDB-2016-008422 // CNNVD: CNNVD-201610-104 // NVD: CVE-2016-5313

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-94132 // JVNDB: JVNDB-2016-008422 // NVD: CVE-2016-5313

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-104

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201610-104

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008422

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-94132

PATCH

title:SYM16-017url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20161005_00

Trust: 0.8

title:Symantec Web Gateway Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64531

Trust: 0.6

title:Symantec Security Advisories: Symantec Web Gateway Management Console Interface Command Injectionurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=ece52ee134ab511c35333f1138743780

Trust: 0.1

sources: VULMON: CVE-2016-5313 // JVNDB: JVNDB-2016-008422 // CNNVD: CNNVD-201610-104

EXTERNAL IDS

db:NVDid:CVE-2016-5313

Trust: 2.9

db:BIDid:93284

Trust: 2.1

db:SECTRACKid:1036973

Trust: 1.8

db:PACKETSTORMid:139006

Trust: 1.8

db:JVNDBid:JVNDB-2016-008422

Trust: 0.8

db:CNNVDid:CNNVD-201610-104

Trust: 0.7

db:VULHUBid:VHN-94132

Trust: 0.1

db:VULMONid:CVE-2016-5313

Trust: 0.1

sources: VULHUB: VHN-94132 // VULMON: CVE-2016-5313 // BID: 93284 // JVNDB: JVNDB-2016-008422 // CNNVD: CNNVD-201610-104 // NVD: CVE-2016-5313

REFERENCES

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20161005_00

Trust: 2.0

url:http://www.securityfocus.com/bid/93284

Trust: 1.8

url:http://seclists.org/fulldisclosure/2016/oct/24

Trust: 1.8

url:http://packetstormsecurity.com/files/139006/symantec-web-gateway-5.2.2-os-command-injection.html

Trust: 1.8

url:http://www.securitytracker.com/id/1036973

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5313

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5313

Trust: 0.8

url:http://securitytracker.com/id/1036973

Trust: 0.6

url:http://www.symantec.com

Trust: 0.3

url:http://www.symantec.com/business/web-gateway

Trust: 0.3

url:https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20161005_00

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=49227

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-94132 // VULMON: CVE-2016-5313 // BID: 93284 // JVNDB: JVNDB-2016-008422 // CNNVD: CNNVD-201610-104 // NVD: CVE-2016-5313

CREDITS

Egidio Romano of Karma(In)Security.

Trust: 0.3

sources: BID: 93284

SOURCES

db:VULHUBid:VHN-94132
db:VULMONid:CVE-2016-5313
db:BIDid:93284
db:JVNDBid:JVNDB-2016-008422
db:CNNVDid:CNNVD-201610-104
db:NVDid:CVE-2016-5313

LAST UPDATE DATE

2025-04-20T23:27:26.774000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-94132date:2017-04-20T00:00:00
db:VULMONid:CVE-2016-5313date:2017-04-20T00:00:00
db:BIDid:93284date:2016-10-10T10:38:00
db:JVNDBid:JVNDB-2016-008422date:2017-05-18T00:00:00
db:CNNVDid:CNNVD-201610-104date:2017-04-17T00:00:00
db:NVDid:CVE-2016-5313date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-94132date:2017-04-12T00:00:00
db:VULMONid:CVE-2016-5313date:2017-04-12T00:00:00
db:BIDid:93284date:2016-10-05T00:00:00
db:JVNDBid:JVNDB-2016-008422date:2017-05-18T00:00:00
db:CNNVDid:CNNVD-201610-104date:2016-10-10T00:00:00
db:NVDid:CVE-2016-5313date:2017-04-12T22:59:00.630