Vulnerabilities > CVE-2014-3437 - XML External Entity Injection vulnerability in Symantec Endpoint Protection Manager

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
symantec
nessus
exploit available

Summary

The management console in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allows remote attackers to read arbitrary files or send TCP requests to intranet servers via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. <a href="http://cwe.mitre.org/data/definitions/611.html" target="_blank">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>

Exploit-Db

descriptionSymantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities. CVE-2014-3437,CVE-2014-3438,CVE-2014-3439. Webapps exploit for jsp platform
idEDB-ID:35181
last seen2016-02-04
modified2014-11-06
published2014-11-06
reporterSEC Consult
sourcehttps://www.exploit-db.com/download/35181/
titleSymantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities

Nessus

NASL familyWindows
NASL idSYMANTEC_ENDPOINT_PROT_MGR_SYM14-015.NASL
descriptionThe version of Symantec Endpoint Protection Manager (SEPM) installed on the remote host is 12.1 prior to 12.1 RU5. It is, therefore, affected by the following vulnerabilities : - An XML external entity (XXE) injection vulnerability due to improper validation of XML external entities. A remote attacker, impersonating the input source of external information or updates, can access restricted data or leverage additional management console functionality using specially crafted XML data. (CVE-2014-3437) - A reflected cross-site scripting vulnerability due to improper validation of user-supplied input to the
last seen2020-06-01
modified2020-06-02
plugin id79083
published2014-11-10
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/79083
titleSymantec Endpoint Protection Manager < 12.1 RU5 Multiple Vulnerabilities (SYM14-015)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(79083);
  script_version("1.8");
  script_cvs_date("Date: 2018/11/15 20:50:29");

  script_cve_id("CVE-2014-3437", "CVE-2014-3438", "CVE-2014-3439");
  script_bugtraq_id(70843, 70844, 70845);
  script_xref(name:"EDB-ID", value:"35181");

  script_name(english:"Symantec Endpoint Protection Manager < 12.1 RU5 Multiple Vulnerabilities (SYM14-015)");
  script_summary(english:"Checks the SEPM version.");

  script_set_attribute(attribute:"synopsis", value:
"The version of Symantec Endpoint Protection Manager installed on the
remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Symantec Endpoint Protection Manager (SEPM) installed
on the remote host is 12.1 prior to 12.1 RU5. It is, therefore,
affected by the following vulnerabilities :

  - An XML external entity (XXE) injection vulnerability due
    to improper validation of XML external entities. A
    remote attacker, impersonating the input source of
    external information or updates, can access restricted
    data or leverage additional management console
    functionality using specially crafted XML data.
    (CVE-2014-3437)

  - A reflected cross-site scripting vulnerability due to
    improper validation of user-supplied input to the
    'ErrorMsg' parameter in 'SSO-Error.jsp'. This allows a
    remote attacker, with a specially crafted request, to
    execute arbitrary script code within the browser /
    server trust relationship. (CVE-2014-3438)

  - An arbitrary file write vulnerability in the
    'ConsoleServlet' due to improper filtering of
    user-supplied data to the logging component. This allows
    a remote attacker to write arbitrary code to the log
    file or disk, potentially causing a denial of
    service or unauthorized elevated access.
    (CVE-2014-3439)");
  # https://support.symantec.com/en_US/article.SYMSA1304.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2ea8ce99");
  script_set_attribute(attribute:"solution", value:"Upgrade to Symantec Endpoint Protection Manager 12.1.5 (RU5) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/11/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/11/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/11/10");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:symantec:endpoint_protection_manager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("symantec_endpoint_prot_mgr_installed.nasl");
  script_require_keys("SMB/sep_manager/path", "SMB/sep_manager/ver");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

display_ver = get_kb_item_or_exit('SMB/sep_manager/ver');
path = get_kb_item_or_exit('SMB/sep_manager/path');

if (display_ver !~ "^12\.") audit(AUDIT_INST_PATH_NOT_VULN, 'Symantec Endpoint Protection Manager', display_ver, path);

fixed_ver = '12.1.5337.5000';

if (ver_compare(ver:display_ver, fix:fixed_ver, strict:FALSE) == -1)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

  if (report_verbosity > 0)
  {
    report =
      '\n  Path              : '+ path +
      '\n  Installed version : '+ display_ver +
      '\n  Fixed version     : '+ fixed_ver +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
}
else audit(AUDIT_INST_PATH_NOT_VULN, 'Symantec Endpoint Protection Manager', display_ver, path);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/129000/SA-20141106-0.txt
idPACKETSTORM:129000
last seen2016-12-05
published2014-11-06
reporterS. Viehbock
sourcehttps://packetstormsecurity.com/files/129000/Symantec-Endpoint-Protection-12.1.4023.4080-XXE-XSS-Arbitrary-File-Write.html
titleSymantec Endpoint Protection 12.1.4023.4080 XXE / XSS / Arbitrary File Write

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:87397
last seen2017-11-19
modified2014-11-13
published2014-11-13
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-87397
titleSymantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities