ID

VAR-201208-0523


CVE

CVE-2012-0307


TITLE

Symantec Messaging Gateway Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2012-003967

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in Symantec Messaging Gateway (SMG) before 10.0 allow remote attackers to inject arbitrary web script or HTML via (1) web content or (2) e-mail content. Symantec Messaging Gateway (formerly known as Brightmail Gateway Small Business Edition) is an easy-to-use email virus protection hardware that provides accurate and effective anti-spam protection. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Symantec Messaging Gateway 9.5.x versions are vulnerable. Symantec Messaging Gateway is a spam filter that integrates anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies from Symantec. ---------------------------------------------------------------------- The new Secunia CSI 6.0 is now available in beta! Seamless integration with your existing security solutions Sign-up to become a Beta tester: http://secunia.com/csi6beta ---------------------------------------------------------------------- TITLE: Symantec Messaging Gateway Multiple Vulnerabilities SECUNIA ADVISORY ID: SA50435 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50435/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 RELEASE DATE: 2012-08-28 DISCUSS ADVISORY: http://secunia.com/advisories/50435/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50435/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50435 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Symantec Messaging Gateway, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose certain sensitive information and conduct cross-site scripting and request forgery attacks. 1) Certain input passed via web or email content is not properly sanitised before being returned to the user. 2) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. gain administrative access when a logged-in administrative user visits a specially crafted web page. 3) An error within the management interface can be exploited to perform otherwise restricted actions and e.g. modify the underlying web application. 4) The weakness is caused due to the application disclosing detailed component version information. The vulnerabilities are reported in versions 9.5.x and prior. SOLUTION: Upgrade to version 10. PROVIDED AND/OR DISCOVERED BY: The vendor credits Ben Williams, NGS Secure. ORIGINAL ADVISORY: http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-0307 // JVNDB: JVNDB-2012-003967 // CNVD: CNVD-2012-4496 // BID: 55138 // VULHUB: VHN-53588 // VULMON: CVE-2012-0307 // PACKETSTORM: 115966

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-4496

AFFECTED PRODUCTS

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 2.5

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.2

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.3

Trust: 1.6

vendor:symantecmodel:messaging gatewayscope:lteversion:9.5.4

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:ltversion:10.0

Trust: 0.8

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.4

Trust: 0.6

vendor:symantecmodel:messaging gatewayscope:neversion:10.0

Trust: 0.3

sources: CNVD: CNVD-2012-4496 // BID: 55138 // JVNDB: JVNDB-2012-003967 // CNNVD: CNNVD-201208-556 // NVD: CVE-2012-0307

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0307
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0307
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-556
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53588
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-0307
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0307
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-53588
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53588 // VULMON: CVE-2012-0307 // JVNDB: JVNDB-2012-003967 // CNNVD: CNNVD-201208-556 // NVD: CVE-2012-0307

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-53588 // JVNDB: JVNDB-2012-003967 // NVD: CVE-2012-0307

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201208-556

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 115966 // CNNVD: CNNVD-201208-556

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003967

PATCH

title:SYM12-013url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.8

title:SYM12-013url:http://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20120827_00

Trust: 0.8

title:Patch for Symantec Messaging Gateway Cross-Site Scripting Vulnerability (CNVD-2012-4496)url:https://www.cnvd.org.cn/patchInfo/show/20817

Trust: 0.6

title:Symantec Security Advisories: Symantec Messaging Gateway Security Issuesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=f3a3464f4effaad7f7f5e4c3ef913cb3

Trust: 0.1

sources: CNVD: CNVD-2012-4496 // VULMON: CVE-2012-0307 // JVNDB: JVNDB-2012-003967

EXTERNAL IDS

db:NVDid:CVE-2012-0307

Trust: 3.5

db:BIDid:55138

Trust: 2.1

db:JVNDBid:JVNDB-2012-003967

Trust: 0.8

db:CNNVDid:CNNVD-201208-556

Trust: 0.7

db:SECUNIAid:50435

Trust: 0.7

db:CNVDid:CNVD-2012-4496

Trust: 0.6

db:NSFOCUSid:20473

Trust: 0.6

db:VULHUBid:VHN-53588

Trust: 0.1

db:VULMONid:CVE-2012-0307

Trust: 0.1

db:PACKETSTORMid:115966

Trust: 0.1

sources: CNVD: CNVD-2012-4496 // VULHUB: VHN-53588 // VULMON: CVE-2012-0307 // BID: 55138 // JVNDB: JVNDB-2012-003967 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-556 // NVD: CVE-2012-0307

REFERENCES

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 2.1

url:http://www.securityfocus.com/bid/55138

Trust: 1.9

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/78031

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0307

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0307

Trust: 0.8

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisoryhttp

Trust: 0.6

url:http://secunia.com/advisories/50435

Trust: 0.6

url:http://www.nsfocus.net/vulndb/20473

Trust: 0.6

url:http://www.symantec.com/messaging-gateway

Trust: 0.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120827_00

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/79.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=26764

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50435

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/50435/#comments

Trust: 0.1

url:http://secunia.com/csi6beta

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/50435/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-4496 // VULHUB: VHN-53588 // VULMON: CVE-2012-0307 // BID: 55138 // JVNDB: JVNDB-2012-003967 // PACKETSTORM: 115966 // CNNVD: CNNVD-201208-556 // NVD: CVE-2012-0307

CREDITS

Ben Williams

Trust: 0.9

sources: BID: 55138 // CNNVD: CNNVD-201208-556

SOURCES

db:CNVDid:CNVD-2012-4496
db:VULHUBid:VHN-53588
db:VULMONid:CVE-2012-0307
db:BIDid:55138
db:JVNDBid:JVNDB-2012-003967
db:PACKETSTORMid:115966
db:CNNVDid:CNNVD-201208-556
db:NVDid:CVE-2012-0307

LAST UPDATE DATE

2024-11-23T22:23:22.776000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4496date:2012-08-29T00:00:00
db:VULHUBid:VHN-53588date:2017-08-29T00:00:00
db:VULMONid:CVE-2012-0307date:2017-08-29T00:00:00
db:BIDid:55138date:2012-08-27T00:00:00
db:JVNDBid:JVNDB-2012-003967date:2012-10-26T00:00:00
db:CNNVDid:CNNVD-201208-556date:2012-08-30T00:00:00
db:NVDid:CVE-2012-0307date:2024-11-21T01:34:46.130

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-4496date:2012-08-29T00:00:00
db:VULHUBid:VHN-53588date:2012-08-29T00:00:00
db:VULMONid:CVE-2012-0307date:2012-08-29T00:00:00
db:BIDid:55138date:2012-08-27T00:00:00
db:JVNDBid:JVNDB-2012-003967date:2012-08-30T00:00:00
db:PACKETSTORMid:115966date:2012-08-28T06:01:36
db:CNNVDid:CNNVD-201208-556date:2012-08-30T00:00:00
db:NVDid:CVE-2012-0307date:2012-08-29T10:56:39.207