Symantec LiveUpdate up to 2.3.2 lua/forcepasswd.do sql injection
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.3 | $0-$5k | 0.11 |
Summary
A vulnerability marked as critical has been reported in Symantec LiveUpdate up to 2.3.2. This issue affects some unknown processing of the file lua/forcepasswd.do. This manipulation causes sql injection. The identification of this vulnerability is CVE-2014-1645. The attack needs to be done within the local network. Furthermore, there is an exploit available. Applying a patch is the recommended action to fix this issue.
Details
A vulnerability classified as critical was found in Symantec LiveUpdate up to 2.3.2. Affected by this vulnerability is an unknown code of the file lua/forcepasswd.do. The manipulation with an unknown input leads to a sql injection vulnerability. The CWE definition for the vulnerability is CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
SQL injection vulnerability in forcepasswd.do in the management GUI in Symantec LiveUpdate Administrator (LUA) 2.x before 2.3.2.110 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
The weakness was shared 03/27/2014 by Stefan Viehböck with SEC Consult Vulnerability Lab as SYM14-005 as confirmed advisory (Website). The advisory is shared at symantec.com. The vendor cooperated in the coordination of the public release. This vulnerability is known as CVE-2014-1645 since 01/23/2014. The attack needs to be initiated within the local network. The exploitation doesn't need any form of authentication. Technical details and also a exploit are known. MITRE ATT&CK project uses the attack technique T1505 for this issue.
It is declared as highly functional. The vulnerability scanner Nessus provides a plugin with the ID 73275 (Symantec LiveUpdate Administrator < 2.3.2.110 Multiple Vulnerabilities (SYM14-005)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses.
Upgrading to version 2.3.2 eliminates this vulnerability. The upgrade is hosted for download at symantec.com. Applying a patch is able to eliminate this problem. The best possible mitigation is suggested to be patching the affected component. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (92117), Tenable (73275), SecurityFocus (BID 66400†), Secunia (SA57659†) and SecurityTracker (ID 1029972†). The entry VDB-12708 is related to this item. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.symantec.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.6
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Sql injectionCWE: CWE-89 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 73275
Nessus Name: Symantec LiveUpdate Administrator < 2.3.2.110 Multiple Vulnerabilities (SYM14-005)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 801835
OpenVAS Name: Symantec LiveUpdate Administrator Multiple Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: LiveUpdate 2.3.2
Timeline
01/23/2014 🔍03/27/2014 🔍
03/27/2014 🔍
03/27/2014 🔍
03/27/2014 🔍
03/28/2014 🔍
03/28/2014 🔍
03/28/2014 🔍
03/31/2014 🔍
04/22/2014 🔍
06/16/2021 🔍
Sources
Vendor: symantec.comAdvisory: SYM14-005
Researcher: Stefan Viehböck
Organization: SEC Consult Vulnerability Lab
Status: Confirmed
Confirmation: 🔍
Coordinated: 🔍
CVE: CVE-2014-1645 (🔍)
GCVE (CVE): GCVE-0-2014-1645
GCVE (VulDB): GCVE-100-12709
IAVM: 🔍
X-Force: 92117 - Symantec LiveUpdate Administrator SQL injection, Medium Risk
SecurityFocus: 66400 - Symantec LiveUpdate Administrator CVE-2014-1645 SQL Injection Vulnerability
Secunia: 57659 - Symantec LiveUpdate Administrator Security Bypass and SQL Injection Vulnerabilities, Less Critical
SecurityTracker: 1029972 - Symantec LiveUpdate Administrator Bugs Let Remote Users Reset Passwords to Arbitrary Values and Inject SQL Commands
Vulnerability Center: 44175 - Symantec LiveUpdate Administrator (LUA) Remote SQL Injection in forcepasswd.do, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/28/2014 09:57Updated: 06/16/2021 09:39
Changes: 03/28/2014 09:57 (87), 08/09/2017 14:08 (6), 06/16/2021 09:39 (2)
Complete: 🔍
Cache ID: 216:940:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.