製品・ソフトウェアに関する情報
Trend Micro InterScan Messaging Security (Virtual Appliance) におけるターミナルコマンドを実行される脆弱性
Title Trend Micro InterScan Messaging Security (Virtual Appliance) におけるターミナルコマンドを実行される脆弱性
Summary

Trend Micro InterScan Messaging Security (Virtual Appliance) には、Web サーバユーザ (root) のコンテキスト内でターミナルコマンドを実行される脆弱性が存在します。

Possible impacts Web サーバユーザ (root) のコンテキスト内でターミナルコマンドを実行される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date March 14, 2017, midnight
Registration Date April 3, 2017, 5:48 p.m.
Last Update April 3, 2017, 5:48 p.m.
CVSS3.0 : 重要
Score 8.8
Vector CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS2.0 : 危険
Score 9
Vector AV:N/AC:L/Au:S/C:C/I:C/A:C
Affected System
トレンドマイクロ
InterScan Messaging Security Virtual Appliance 9.1-1600
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2017年04月03日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-6398
Summary

An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.

Publication Date March 14, 2017, 6:59 p.m.
Registration Date Jan. 26, 2021, 1:27 p.m.
Last Update Nov. 21, 2024, 12:29 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1-1600:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List