The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-15386 The Symantec Messaging Gateway can encounter a file inclusion vulnerability, which is a type of vulnerability that is most commonly found to affect web applications that rely on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. This file inclusion vulnerability subverts how an application loads code for execution. Successful exploitation of a file inclusion vulnerability will result in remote code execution on the web server that runs the affected web application.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: symantec

Published:

Updated: 2024-08-05T15:25:49.167Z

Reserved: 2017-02-26T00:00:00

Link: CVE-2017-6325

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-06-26T21:29:00.237

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-6325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.