The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application.
References
Link | Resource |
---|---|
https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170621_00 | Vendor Advisory |
http://www.securityfocus.com/bid/98890 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038785 |
Configurations
Information
Published : 2017-06-26 14:29
Updated : 2017-07-06 18:29
NVD link : CVE-2017-6325
Mitre link : CVE-2017-6325
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
symantec
- messaging_gateway