Описание
admin_messages.php in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary code by uploading a file with a safe extension and content type, and then leveraging an improper Sudo configuration to make this a setuid-root file.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.2.2 (включая)
cpe:2.3:a:symantec:web_gateway:*:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05789
Низкий
7.9 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
admin_messages.php in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary code by uploading a file with a safe extension and content type, and then leveraging an improper Sudo configuration to make this a setuid-root file.
EPSS
Процентиль: 90%
0.05789
Низкий
7.9 High
CVSS2
Дефекты
CWE-264