-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3254
            Symantec SYMSA1472 - XSS and Information Disclosure
                    Vulnerabilities in ASG and ProxySG
                              28 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Symantec Advanced Secure Gateway
                   Symantec Proxy Secure Gateway
Publisher:         Symantec
Operating System:  Network Appliance
Impact/Access:     Cross-site Scripting     -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-18371 CVE-2018-18370 

Original Bulletin: 
   http://support.symantec.com/us/en/article.SYMSA1472.html

- --------------------------BEGIN INCLUDED TEXT--------------------

XSS and Information Disclosure Vulnerabilities in ASG and ProxySG

SYMSA1472
Last Updated August 27, 2019
Initial Publication Date December 19, 2018

  o Status: Closed
  o Severity: Medium
  o CVSS Base Score: 6.5

Summary

Affected Products

+-----------------------------------------------------------------------------+
|                        Advanced Secure Gateway (ASG)                        |
+--------------------------+------------------+-------------------------------+
|           CVE            |Supported Version |Remediation                    |
|                          |(s)               |                               |
+--------------------------+------------------+-------------------------------+
|                          |7.1               |Not vulnerable, fixed.         |
|                          +------------------+-------------------------------+
|     CVE-2018-18370,      |6.7               |Upgrade to 6.7.4.2.            |
|      CVE-2018-18371      +------------------+-------------------------------+
|                          |6.6               |Upgrade to later release with  |
|                          |                  |fixes.                         |
+--------------------------+------------------+-------------------------------+

+-----------------------------------------------------------------------------+
|                                   ProxySG                                   |
+--------------------------+------------------+-------------------------------+
|           CVE            |Supported Version |Remediation                    |
|                          |(s)               |                               |
+--------------------------+------------------+-------------------------------+
|                          |7.1               |Not vulnerable, fixed.         |
|                          +------------------+-------------------------------+
|                          |6.7               |Upgrade to 6.7.4.2.            |
|     CVE-2018-18370,      +------------------+-------------------------------+
|      CVE-2018-18371      |6.6               |Upgrade to later release with  |
|                          |                  |fixes.                         |
|                          +------------------+-------------------------------+
|                          |6.5               |Upgrade to 6.5.10.15.          |
+--------------------------+------------------+-------------------------------+

Issues


+-----------------------------------------------------------------------------+
|                               CVE-2018-18370                                |
+-----------+-----------------------------------------------------------------+
|Severity / |Medium / 6.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)               |
|  CVSSv3   |                                                                 |
+-----------+-----------------------------------------------------------------+
|References |SecurityFocus: BID 109823 / NVD: CVE-2018-18370                  |
+-----------+-----------------------------------------------------------------+
|  Impact   |Cross-site scripting (XSS)                                       |
+-----------+-----------------------------------------------------------------+
|           |The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP    |
|           |connections where a user accesses an FTP server via a ftp:// URL |
|           |in a web browser. A stored cross-site scripting (XSS)            |
|Description|vulnerability in the WebFTP mode allows a remote attacker to     |
|           |inject malicious JavaScript code in ASG/ProxySG's web listing of |
|           |a remote FTP server. Exploiting the vulnerability requires the   |
|           |attacker to be able to upload crafted files to the remote FTP    |
|           |server.                                                          |
+-----------+-----------------------------------------------------------------+

+-----------------------------------------------------------------------------+
|                               CVE-2018-18371                                |
+-----------+-----------------------------------------------------------------+
|Severity / |Medium / 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)               |
|  CVSSv3   |                                                                 |
+-----------+-----------------------------------------------------------------+
|References |SecurityFocus: BID 109823 / NVD: CVE-2018-18371                  |
+-----------+-----------------------------------------------------------------+
|  Impact   |Information disclosure                                           |
+-----------+-----------------------------------------------------------------+
|           |The ASG/ProxySG FTP proxy WebFTP mode allows intercepting FTP    |
|           |connections where a user accesses an FTP server via a ftp:// URL |
|Description|in a web browser. An information disclosure vulnerability in the |
|           |WebFTP mode allows a malicious user to obtain plaintext          |
|           |authentication credentials for a remote FTP server from the ASG/ |
|           |ProxySG's web listing of the FTP server.                         |
+-----------+-----------------------------------------------------------------+

Acknowledgements

  o CVE-2018-18370 & CVE-2018-18371: Muzamal Abadullah, Two Sigma Investments

Revisions

2019-08-27 initial public release

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Wzod
-----END PGP SIGNATURE-----