Vulnerability Details : CVE-2012-0299
Public exploit exists!
The file-management scripts in the management GUI in Symantec Web Gateway 5.0.x before 5.0.3 allow remote attackers to upload arbitrary code to a designated pathname, and possibly execute this code, via unspecified vectors.
Products affected by CVE-2012-0299
- cpe:2.3:a:symantec:web_gateway:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0299
96.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-0299
-
Symantec Web Gateway 5.0.2.8 Arbitrary PHP File Upload Vulnerability
Disclosure Date: 2012-05-17First seen: 2020-04-26exploit/linux/http/symantec_web_gateway_file_uploadThis module exploits a file upload vulnerability found in Symantec Web Gateway's HTTP service. Due to the incorrect use of file extensions in the upload_file() function, attackers may to abuse the spywall/blocked_file.php file in order to upload a malicious P
CVSS scores for CVE-2012-0299
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2012-0299
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0299
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00
Symantec Web Gateway Multiple Security IssuesVendor Advisory
-
http://www.securityfocus.com/bid/53443
Symantec Web Gateway Management Scripts Arbitrary File Upload Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75730
Symantec Web Gateway unspecified command execution CVE-2012-0299 Vulnerability Report
Jump to