Vulnerability Name: | CCN-123561 | ||||||
Published: | 2017-03-22 | ||||||
Updated: | 2017-03-22 | ||||||
Summary: | Trend Micro Control Manager could allow a remote authenticated attacker to execute arbitrary code on the system, caused by the improper validation of a user-supplied string prior to using it to construct SQL queries when processing the SpecialSpywarePolicyResult.xhtml. An attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: XF Type: UNKNOWN trendmicro-specialspyware-code-exec(123561) Source: CCN Type: Trend Micro Security Bulletin 1116863 Multiple Vulnerabilities in Trend Micro Control Manager (TMCM) 6.0 Source: CCN Type: ZDI-17-186 Trend Micro Control Manager CCGIServlet SpecialSpywarePolicyResult SQL Injection Remote Code Execution Vulnerability | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |