Summary
Vordel Gateway is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
A remote attacker could exploit this vulnerability using directory- traversal strings (such as '../') to gain access to arbitrary files on the targeted system. This may result in the disclosure of sensitive information or lead to a complete compromise of the affected computer.
Vordel Gateway 6.0.3 is vulnerable
other versions may also be
affected.
Solution
Reportedly, the issue is fixed
however, Symantec has not confirmed
this. Please contact the vendor for more information.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache Solr Directory Traversal Vulnerability Jan-14
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
- Apache Tomcat Directory Listing and File disclosure
- Apache Struts2 'XWork' Information Disclosure Vulnerability