CVE-2004-0192
CVSS6.8
发布时间 :2004-03-15 00:00:00
修订时间 :2016-10-17 22:41:42
NMCOES    

[原文]Cross-site scripting (XSS) vulnerability in the Management Service for Symantec Gateway Security 2.0 allows remote attackers to steal cookies and hijack a management session via a /sgmi URL that contains malicious script, which is not quoted in the resulting error page.


[CNNVD]Symantec Gateway Security错误页跨站脚本漏洞(CNNVD-200403-082)

        
        Symantec Gateway Security 5400 系列是Symantec开发的防火墙设备。
        Symantec Gateway Security的管理控制服务平台在生成错误页面时缺少充分的数据过滤,远程攻击者可以利用这个漏洞获得管理员敏感信息,如COOKIE信息。
        问题存在于Symantec Gateway Security基于WEB的管理服务中,当客户端提交URL请求由Symantec Gateway Security服务对象处理时,如果处理的URL不存在,如请求/sgmi目录中的任意对象,会返回错误页面给请求浏览器,但生成错误页面内容时对数据缺少充分过滤,因此可导致恶意脚本以SGS设备上下文执行。可允许攻击者劫持设备的管理会话。
        

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0192
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0192
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-082
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107790684732458&w=2
(UNKNOWN)  BUGTRAQ  20040227 Symantec Gateway Security Management Service Cross Site Scripting
http://www.securityfocus.com/bid/9755
(VENDOR_ADVISORY)  BID  9755
http://xforce.iss.net/xforce/xfdb/15330
(VENDOR_ADVISORY)  XF  symantecgateway-error-xss(15330)

- 漏洞信息

Symantec Gateway Security错误页跨站脚本漏洞
中危 输入验证
2004-03-15 00:00:00 2005-10-20 00:00:00
远程  
        
        Symantec Gateway Security 5400 系列是Symantec开发的防火墙设备。
        Symantec Gateway Security的管理控制服务平台在生成错误页面时缺少充分的数据过滤,远程攻击者可以利用这个漏洞获得管理员敏感信息,如COOKIE信息。
        问题存在于Symantec Gateway Security基于WEB的管理服务中,当客户端提交URL请求由Symantec Gateway Security服务对象处理时,如果处理的URL不存在,如请求/sgmi目录中的任意对象,会返回错误页面给请求浏览器,但生成错误页面内容时对数据缺少充分过滤,因此可导致恶意脚本以SGS设备上下文执行。可允许攻击者劫持设备的管理会话。
        

- 公告与补丁

        厂商补丁:
        Symantec
        --------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Symantec Symantec Gateway Security 5400 Series 2.0:
        Symantec Hotfix bundle-sgs20.exe
        ftp://ftp.symantec.com/public/updates/bundle-sgs20.exe

- 漏洞信息 (23764)

Symantec Gateway Security 5400 Series 2.0 Error Page Cross-Site Scripting Vulnerability (EDBID:23764)
hardware remote
2004-02-26 Verified
0 Soby
N/A [点击下载]
source: http://www.securityfocus.com/bid/9755/info

A vulnerability has been reported to exist in the Symantec Gateway Security Web based management console that may allow a remote user to launch cross-site scripting attacks.

The issue is reported to exist due to improper sanitizing of user-supplied data. It has been reported that HTML and script code passed to the Symantec Gateway Security Web based management console via a specially crafted URI, may be incorporated into dynamic content of a server error page.

Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials. If an attacker manages to steal a cookie for a valid session, the attacker may leverage the vulnerability to gain management rights to the affected device. 

https://example.com:2456/sgmi/<script>badscript</script> 		

- 漏洞信息

4706
Symantec Gateway Security Management Service XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Symantec Gateway Security's management service contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate URLs before returning it in an error message. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-02-27 Unknow
2004-02-27 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Symantec has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Symantec Gateway Security Error Page Cross-Site Scripting Vulnerability
Input Validation Error 9755
Yes No
2004-02-26 12:00:00 2009-07-12 03:06:00
Discovery of this vulnerability has been credited to Brian Soby, Raytheon <Brian_J_Soby@raytheon.com>

- 受影响的程序版本

Symantec Symantec Gateway Security 5400 Series 2.0

- 漏洞讨论

A vulnerability has been reported to exist in the Symantec Gateway Security Web based management console that may allow a remote user to launch cross-site scripting attacks.

The issue is reported to exist due to improper sanitizing of user-supplied data. It has been reported that HTML and script code passed to the Symantec Gateway Security Web based management console via a specially crafted URI, may be incorporated into dynamic content of a server error page.

Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials. If an attacker manages to steal a cookie for a valid session, the attacker may leverage the vulnerability to gain management rights to the affected device.

- 漏洞利用

The following proof of concept has been supplied:

https://example.com:2456/sgmi/&lt;script&gt;badscript&lt;/script&gt;

- 解决方案

Symantec has released an advisory (SYM04-003) and fix for this issue. The fix is included in the SG8000-20040130-00 - February hotfix bundle. It is also available via the web at the following location:


Symantec Symantec Gateway Security 5400 Series 2.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站