SA45 : ProxySG privilege escalation
1206
03 March 2020
16 August 2010
CLOSED
HIGH
CVSS v2: 7.4
SUMMARY
A read only ProxySG administrator can gain full administrative control by sending CLI commands over HTTPS to the ProxySG.
AFFECTED PRODUCTS
All versions of ProxySG prior to 6.1 are vulnerable.
ProxySG 6.1 - a fix is available in SGOS 6.1.1.1.
ProxySG 5.5 - a fix is available in SGOS 5.5.4.1.
ProxySG 5.4 - a fix is available in SGOS 5.4.5.1.
ProxySG 5.3 - please upgrade to a later version.
ProxySG 4.3 - a fix is available in SGOS 4.3.4.1.
ProxySG 4.2 - please upgrade to a later version.
For information on how to upgrade SGOS, please see KB3608.
ISSUES
A read only administrator is limited to a small subset of commands that cannot change the configuration of the ProxySG. Privileges are limited in ProxySG for commands entered in the Management Console and the CLI. Sending commands via an HTTPS URL bypasses the privilege enforcement and allows a read only administrator to execute all administrative commands.
CVSS v2 score: 7.4 (AV:A/AC:M/Au:S/C:C/I:C/A:C)
MITIGATION
Disabling all read-only administrators will prevent this vulnerability from being exploited.
ACKNOWLEDGEMENTS
The vulnerability was discovered by Jonathon Krier and Laurent Mathieu from Verizon Business Luxembourg and reported by Thierry Zoller from Verizon Business Luxembourg.
REVISION
2012-01-17 Changed status to final.
2011-02-17 Update the SGOS 5.5 fix from SGOS 5.5.3.1 to 5.5.4.1 to reflect issues that affect SGOS 5.5.3.1. Updated SGOS 4.3 fix to reflect that the issue is resolved in SGOS 4.3.4.1. Also included link to KB3608 on how to update SGOS.
2010-11-04 Notification of a fix in patch release 4.3.3.16.
2010-11-01 Notification of a patch release to address the defect in 5.5.3.1.
2010-10-27 Notification of 5.4.5.1 patch release being promoted to a GA release.
2010-10-15 Notification of a fix in patch release 5.4.5.1.
2010-09-29 Notification of a fix in 6.1.1.1. Update of pages affected by the defect in 5.5.3.1.
2010-10-02 Added information about a defect in 5.5.3.1.
2010-09-01 Added a workaround.
2010-08-23 Ammended the discovery of the vulnerability to properly credit Jonathon Krier and Laurent Mathieu.
2010-08-16 Initial public release.