The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to execute arbitrary commands via crafted input to application scripts.
Published 2012-07-23 17:55:03
Updated 2017-12-22 02:29:10
Source CERT/CC
View at NVD,   CVE.org

Products affected by CVE-2012-2953

Exploit prediction scoring system (EPSS) score for CVE-2012-2953

95.27%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2012-2953

  • Symantec Web Gateway 5.0.2.18 pbcontrol.php Command Injection
    Disclosure Date: 2012-07-23
    First seen: 2020-04-26
    exploit/linux/http/symantec_web_gateway_pbcontrol
    This module exploits a command injection vulnerability found in Symantec Web Gateway's HTTP service. While handling the filename parameter, the Spywall API does not do any filtering before passing it to an exec() call in proxy_file(), thus results in remote code e

CVSS scores for CVE-2012-2953

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST

CWE ids for CVE-2012-2953

References for CVE-2012-2953

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!