First published: Mon Jul 11 2011(Updated: )
SQL injection vulnerability in forget.php in the management GUI in Symantec Web Gateway 4.5.x allows remote attackers to execute arbitrary SQL commands via the username parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Web Gateway | =4.5.2.72 | |
Symantec Web Gateway | =4.5 | |
Symantec Web Gateway | =4.5.1.44 | |
Symantec Web Gateway | =4.5.2.65 | |
Symantec Web Gateway | =4.5.2.37 | |
Symantec Web Gateway | =4.5.4.9 | |
Symantec Web Gateway | =4.5.3.38 | |
Symantec Web Gateway | =4.5.0.326 | |
Symantec Web Gateway | =4.5.1.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0549 is classified as a critical severity vulnerability due to the potential for remote attackers to execute arbitrary SQL commands.
To fix CVE-2011-0549, users should apply the latest security patch provided by Symantec for Web Gateway versions affected.
CVE-2011-0549 affects Symantec Web Gateway versions 4.5, 4.5.0.326, 4.5.1.34, 4.5.1.44, 4.5.2.37, 4.5.2.65, 4.5.2.72, 4.5.3.38, and 4.5.4.9.
Attackers can exploit CVE-2011-0549 by sending specially crafted SQL queries through the username parameter in forget.php.
The potential impacts of CVE-2011-0549 include unauthorized data access, data manipulation, and compromising the integrity of the database.