File Inclusion Vulnerability in Symantec Messaging Gateway
CVE-2017-6325

6.6MEDIUM

Key Information:

Vendor
Symantec Corporation
Status
Messaging Gateway
Vendor
CVE Published:
26 June 2017

Summary

The Symantec Messaging Gateway is susceptible to a file inclusion vulnerability that arises from mishandling an attacker-controlled variable. When the application constructs a path to executable code, it inadvertently allows the attacker to dictate which file gets executed during runtime. This flaw can enable remote unauthorized access, potentially leading to the execution of malicious code on the web server hosting the application. Proper security measures are crucial to mitigate this risk and protect organizational resources.

Affected Version(s)

Messaging Gateway All versions prior to version 10.6.3

References

CVSS V3.1

Score:
6.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.