HTTP: Symantec Messaging Gateway performRestore Command Injection

A command injection vulnerability has been reported in Symantec Messaging Gateway. A remote attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation results in the execution of arbitrary commands as the administrative user.

Extended Description

The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of remote code execution, which describes a situation whereby an individual may obtain the ability to execute commands remotely on a target machine or in a target process. In this type of occurrence, after gaining access to the system, the attacker may attempt to elevate their privileges.

Affected Products

Symantec message_gateway

Short Name
HTTP:STC:SYMANTEC-CMD-INJ
Severity
Critical
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2017-6327 Command Gateway Injection Messaging Symantec bid:100135 performRestore
Release Date
08/31/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3337
False Positive
Unknown
Vendors

Symantec

CVSS Score

6.5

Found a potential security threat?