Vulnerabilities > CVE-2006-0230 - Remote vulnerability in Symantec Antivirus Scan Engine 5.0.0.24

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
symantec
critical
nessus
exploit available

Summary

Symantec Scan Engine 5.0.0.24, and possibly other versions before 5.1.0.7, uses a client-side check to verify a password, which allows remote attackers to gain administrator privileges via a modified client that sends certain XML requests.

Vulnerable Configurations

Part Description Count
Application
Symantec
1

Exploit-Db

descriptionSymantec Scan Engine 5.0.x.x Change Admin Password Remote Exploit. CVE-2006-0230. Remote exploit for windows platform
idEDB-ID:1703
last seen2016-01-31
modified2006-04-21
published2006-04-21
reporterMarc Bevand
sourcehttps://www.exploit-db.com/download/1703/
titleSymantec Scan Engine 5.0.x.x Change Admin Password Remote Exploit

Nessus

NASL familyCGI abuses
NASL idSYMANTEC_SCAN_ENGINE_MULTIPLE.NASL
descriptionThe remote host appears to be running Symantec Scan Engine. This version of Scan Engine is vulnerable to several flaws that could allow a remote attacker to take control of the scan engine. The following flaws are present: - Fixed HTTPS certificate key - Configuration file retrieval (with administrator password hash) - Possibility to change the administrator password
last seen2020-06-01
modified2020-06-02
plugin id21271
published2006-04-24
reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/21271
titleSymantec AntiVirus Scan Engine Web Interface Multiple Remote Vulnerabilities
code
#
# Copyright (C) Tenable Network Security 
#


include("compat.inc");

if(description)
{
 script_id(21271);
 script_version ("1.18");
 script_cve_id("CVE-2006-0230","CVE-2006-0231","CVE-2006-0232");
 script_bugtraq_id(17637);

 script_name(english:"Symantec AntiVirus Scan Engine Web Interface Multiple Remote Vulnerabilities");
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to take control of the remote scan engine." );
 script_set_attribute(attribute:"description", value:
"The remote host appears to be running Symantec Scan Engine.

This version of Scan Engine is vulnerable to several flaws that could
allow a remote attacker to take control of the scan engine. 
The following flaws are present:

- Fixed HTTPS certificate key
- Configuration file retrieval (with administrator password hash)
- Possibility to change the administrator password" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Scan Engine 5.1.0.7 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/04/24");
 script_set_attribute(attribute:"vuln_publication_date", value: "2006/04/21");
 script_set_attribute(attribute:"patch_publication_date", value: "2006/04/21");
 script_cvs_date("Date: 2018/08/01 17:36:12");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:symantec:antivirus_scan_engine");
script_end_attributes();

 script_summary(english:"Checks if Symantec Scan Engine is vulnerable");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 8004);
 exit(0);
}

include("global_settings.inc");
include ("misc_func.inc");
include ("http.inc");

port = get_http_port(default:8004);

r = http_get_cache(item:"/", port:port, exit_on_fail: 1);
if ( ("<title>Scan Engine</title>" >!< r) || ("com.symantec.gui" >!< r) )
  exit(0);


req = string("GET /configuration.xml\\ HTTP/1.0\r\n\r\n");

buf = http_send_recv_buf(port:port, data:req, exit_on_fail: 1);


if (("<password value=" >< buf) && ("AutomaticSendVirusUpdatesEnabled" >< buf))
{
 line = egrep(pattern:".*password value=", string:buf);
 pass = ereg_replace (pattern:'.*<password value="([A-Z0-9]+)"/>.*', string:line, replace:"\1");
 report = string ("The administrator password hash (from the configuration file) is:\n\n",		
		pass);

 security_hole(port: port, extra:report);
 exit(0);
}