Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score:Legacy ID
7 Jul 2011 Closed Medium 5.82 SYM11-008
Symantec’s Web Gateway management GUI is susceptible to blind SQL injection which could result in the injection of arbitrary code into the backend database.
Symantec Web Gateway
Upgrade to Symantec Web Gateway 5.0.1
CVSS2 Base Score: 5.82
Impact 6.4, Exploitability 6.45
CVSS2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P
Exploit Publicly Available: No
Symantec was notified of a blind SQL injection vulnerability in the management console of the Symantec Web Gateway Appliance. The interface fails to properly filter/validate external input.
In a normal installation, the affected management interface should not be accessible external to the network. However, an authorized but unprivileged network user or an external attacker who is able to leverage network access could attempt such an attack against the management interface. The successful exploitation of this vulnerability could potentially result in arbitrary SQL command input to the backend database.
Symantec engineers have verified this issue and released an update to address it. This issue is resolved in Symantec Web Gateway 5.0.1 currently available to customers through normal update channels.
Symantec is not aware of any exploitation of, or adverse customer impact from this issue.
As part of normal best practices, Symantec strongly recommends:
Restrict access to administration or management systems to privileged users.
Disable remote access or restrict it to trusted/authorized systems only.
Keep all operating systems and applications updated with the latest vendor patches.
Follow a multi-layered approach to security. Run both firewall and anti-malware applications, at a minimum, to provide multiple points of detection and protection to both inbound and outbound threats.
Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in detection of attacks or malicious activity related to exploitation of latent vulnerabilities