Symantec Messaging Gateway is prone to multiple arbitrary file-download vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
Credit:
The information has been provided by Ben Williams.
Vulnerable Systems:
* Symantec Messaging Gateway 9.5.1 and prior
Multiple directory traversal vulnerabilities in Symantec Messaging Gateway 9.5 and 9.5.1 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) logFile parameter in a logs action to brightmail/export or (2) localBackupFileSelection parameter in an APPLIANCE restoreSource action to brightmail/admin/restore/download.do.
Attackers can use a browser to exploit these issues. The following example URIs are available:
http://www.example.com/brightmail/export?type=logs&logFile=../../../etc/passwd&logType=1&browserType=1
http://www.example.com/brightmail/admin/restore/download.do?no-cache=false&displayTab=restore&restoreSource=APPLIANCE&localBackupFileSelection=../../etc/passwd