The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.
References
Configurations
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://karmainsecurity.com/KIS-2014-19 - | |
References | () http://osvdb.org/show/osvdb/116009 - | |
References | () http://packetstormsecurity.com/files/130612/Symantec-Web-Gateway-5-restore.php-Command-Injection.html - | |
References | () http://www.exploit-db.com/exploits/36263 - | |
References | () http://www.securityfocus.com/bid/71620 - | |
References | () http://www.securitytracker.com/id/1031386 - | |
References | () http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20141216_00 - Vendor Advisory |
Information
Published : 2014-12-17 16:59
Updated : 2024-11-21 02:16
NVD link : CVE-2014-7285
Mitre link : CVE-2014-7285
CVE.ORG link : CVE-2014-7285
JSON object : View
Products Affected
symantec
- web_gateway
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')