HTTP: Symantec Web Gateway blocked.php Blind SQL Injection

This signature detects attempts to exploit a known vulnerability in Symantec Web Gateway. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Extended Description

Symantec Web Gateway is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Symantec Web Gateway versions 5.0.x.x are vulnerable.

Affected Products

Symantec web_gateway

References

BugTraq: 54424

CVE: CVE-2012-2574

Short Name
HTTP:SQL:INJ:SYMC-BLOCKED-PHP
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Blind CVE-2012-2574 Gateway Injection SQL Symantec Web bid:54424 blocked.php
Release Date
08/03/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Symantec

CVSS Score

7.5

Found a potential security threat?