First published: Wed Dec 11 2019(Updated: )
Symantec Messaging Gateway, prior to 10.7.3, may be susceptible to a server-side request forgery (SSRF) exploit, which is a type of issue that can let an attacker send crafted requests from the backend server of a vulnerable web application or access services available through the loopback interface.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Messaging Gateway | <10.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18379 is a vulnerability in Symantec Messaging Gateway prior to version 10.7.3 that can be exploited to perform server-side request forgery (SSRF).
Server-side request forgery (SSRF) is a type of vulnerability that allows an attacker to send crafted requests from the backend server of a vulnerable web application.
CVE-2019-18379 affects Symantec Messaging Gateway versions prior to 10.7.3, making them susceptible to server-side request forgery (SSRF) attacks.
CVE-2019-18379 has a severity score of 7.3, indicating a high level of risk.
To fix CVE-2019-18379, you should update Symantec Messaging Gateway to version 10.7.3 or later as recommended by Symantec.