Published: 21/05/2012 Updated: 05/12/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The file-management scripts in the management GUI in Symantec Web Gateway 5.0.x prior to 5.0.3 allow remote malicious users to (1) read or (2) delete arbitrary files via unspecified vectors.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

symantec web gateway 5.0

symantec web gateway 5.0.1

symantec web gateway 5.0.2

Vendor Advisories

Symantec’s Web Gateway management GUI is susceptible to file include command injection/execution, file upload/execution and file download/deletion security issues  The management GUI is also susceptible to cross-site scripting (XSS)  Successful exploitation could result in execution of arbitrary code in the context of the application, denia ...


Software: Symantec Web Gateway Current Software Version: 5028 Product homepage: wwwsymanteccom Author: S2 Crew [Hungary] CVE: CVE-2012-0297, CVE-2012-0298, ??? File include: 19216882207/spywall/previewProxyErrorphp?err=////////etc/passwd File include and OS command execution: 19216882207/ ...

Mailing Lists

Symantec Web Gateway version 5028 suffers from local file inclusion, remote command execution, and arbitrary file deletion vulnerabilities ...