Trend Micro InterScan Messaging Security (Virtual Appliance) におけるターミナルコマンドを実行される脆弱性
| Title |
Trend Micro InterScan Messaging Security (Virtual Appliance) におけるターミナルコマンドを実行される脆弱性
|
| Summary |
Trend Micro InterScan Messaging Security (Virtual Appliance) には、Web サーバユーザ (root) のコンテキスト内でターミナルコマンドを実行される脆弱性が存在します。
|
| Possible impacts |
Web サーバユーザ (root) のコンテキスト内でターミナルコマンドを実行される可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
March 14, 2017, midnight |
| Registration Date |
April 3, 2017, 5:48 p.m. |
| Last Update |
April 3, 2017, 5:48 p.m. |
|
CVSS3.0 : 重要
|
| Score |
8.8
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
CVSS2.0 : 危険
|
| Score |
9
|
| Vector |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Affected System
| トレンドマイクロ |
|
InterScan Messaging Security Virtual Appliance 9.1-1600
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2017年04月03日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2017-6398
| Summary |
An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.
|
| Publication Date |
March 14, 2017, 6:59 p.m. |
| Registration Date |
Jan. 26, 2021, 1:27 p.m. |
| Last Update |
Nov. 21, 2024, 12:29 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1-1600:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List