Short Name |
HTTP:PHP:SYM-WG-IPCHANG |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Symantec Web Gateway ipchange.php Command Injection |
Release Date |
2012/06/25 |
Update Number |
2155 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known command injection vulnerability in Symantec Web Gateway. It is due to improper input filtering. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the process.
Symantec Web Gateway is prone to a vulnerability that can allow an attacker to execute arbitrary commands. Successful exploits will result in the execution of arbitrary attack-supplied commands in the context of the affected application.