CVE-2017-15532
Summary
| CVE | CVE-2017-15532 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-12-20 18:29:00 UTC |
| Updated | 2018-01-05 19:43:00 UTC |
| Description | Prior to 10.6.4, Symantec Messaging Gateway may be susceptible to a path traversal attack (also known as directory traversal). These types of attacks aim to access files and directories that are stored outside the web root folder. By manipulating variables, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Symantec | Messaging Gateway | All | All | All | All |
| Application | Symantec | Messaging Gateway | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Symantec Messaging Gateway CVE-2017-15532 Directory Traversal Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Symantec Messaging Gateway Directory Traversal | CONFIRM | www.symantec.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.