{ "id": "CVE-2017-6328", "sourceIdentifier": "secure@symantec.com", "published": "2017-08-11T20:29:00.237", "lastModified": "2017-08-24T19:57:35.500", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of cross site request forgery (also known as one-click attack and is abbreviated as CSRF or XSRF), which is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. A CSRF attack attempts to exploit the trust that a specific website has in a user's browser." }, { "lang": "es", "value": "Symantec Messaging Gateway en versiones anteriores a la 10.6.3-267 puede encontrarse con un problema de tipo cross site request forgery (tambi\u00e9n conocido como ataque en un clic y abreviado como CSRF o XSRF), que es un tipo de exploit malicioso de un sitio web en el que un usuario en el que conf\u00eda la aplicaci\u00f3n web transmite comandos sin autorizaci\u00f3n. Un ataque CSRF intenta explotar la confianza que un sitio web espec\u00edfico tiene en el navegador de un usuario." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:symantec:message_gateway:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.6.3-2", "matchCriteriaId": "14960FF1-4537-46E3-BDCE-3970DFAA89D1" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/100136", "source": "secure@symantec.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00", "source": "secure@symantec.com", "tags": [ "Vendor Advisory" ] } ] }