Vulnerability Details CVE-2015-5692
admin_messages.php in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to execute arbitrary code by uploading a file with a safe extension and content type, and then leveraging an improper Sudo configuration to make this a setuid-root file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.07
EPSS Ranking 91.0%
CVSS Severity
CVSS v2 Score 7.9
Products affected by CVE-2015-5692
-
cpe:2.3:a:symantec:web_gateway:5.0
-
cpe:2.3:a:symantec:web_gateway:5.0.1
-
cpe:2.3:a:symantec:web_gateway:5.0.2
-
cpe:2.3:a:symantec:web_gateway:5.0.3
-
cpe:2.3:a:symantec:web_gateway:5.0.3.18
-
cpe:2.3:a:symantec:web_gateway:5.1
-
cpe:2.3:a:symantec:web_gateway:5.1.1
-
cpe:2.3:a:symantec:web_gateway:5.2
-
cpe:2.3:a:symantec:web_gateway:5.2.1