CVE ID | CVE-2010-3719 |
CVSS SCORE | 8.5, AV:N/AC:M/Au:S/C:C/I:C/A:C |
AFFECTED VENDORS |
Symantec |
AFFECTED PRODUCTS |
IM Manager |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['10776']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is required to exploit this vulnerability in that a logged in user must be coerced into visiting a malicious link. The specific flaw exists within the ScheduleTask method exposed by the IMAdminSchedTask.asp page hosted on the web interface. This function does not properly sanitize user input from a POST variable before passing it to an eval call. An attacker can abuse this to inject and execute arbitrary ASP under the context of the user visiting the malicious link. |
ADDITIONAL DETAILS |
Symantec has issued an update to correct this vulnerability. More details can be found at:
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110131_00 |
DISCLOSURE TIMELINE |
|
CREDIT | Andrea Micalizzi aka rgod |