Vulnerability CVE-2016-7552


Published: 2017-04-12

Description:
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.

See advisories in our WLB2 database:
Topic
Author
Date
High
Trend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution
Roberto Suggi Li...
19.04.2017
High
Trend Micro TDA 2.6.1062r1 log_query_dlp.cgi Remote Code Execution
Steven Seeley
20.04.2017
High
Trend Micro TDA 2.6.1062r1 log_query_dae.cgi Remote Code Execution
Steven Seeley
20.04.2017

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Trendmicro -> Threat discovery appliance 

 References:
http://www.securityfocus.com/bid/97599
https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6

Copyright 2024, cxsecurity.com

 

Back to Top