7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.045 Low
EPSS
Percentile
92.5%
Trend Micro Control Manager fails to properly filter user-supplied input within the ad hoc query
module which could allow an attacker to upload and execute arbitrary code against the system.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Trend Micro Control Manager does not properly filter user-supplied input within the ad hoc query
module. The successful exploitation of this vulnerability could potentially result in arbitrary SQL command input to the backend database. A remote attacker can execute SQL commands to upload and execute arbitrary code against the system.
An attacker with access to the Trend Micro Control Manager web interface can conduct a sql injection attack, which could be used to result in information leakage, arbitrary code execution and/or denial of service.
The vendor has stated that these vulnerabilities have been addressed in Trend Micro Control Manager version 5.5 and 6.0 critical patches.
* Users of Trend Micro Control Manager version 5.5 are advised to apply [Critical Patch - Build 1823](<http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_TMCM55_1823.txt>).
* Users of Trend Micro Control Manager version 6.0 are advised to apply [Critical Patch - Build 1449](<http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt>).
Restrict access
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user’s host. Restricting access would prevent an attacker from accessing the Trend Micro Control Manager web interface using stolen credentials from a blocked network location.
950795
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: August 03, 2012 Updated: September 21, 2012
Affected
We have not received a statement from the vendor.
Users of Trend Micro Control Manager version 5.5 are advised to apply Critical Patch - Build 1823.
* Users of Trend Micro Control Manager version 6.0 are advised to apply [Critical Patch - Build 1449](<http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt>).
<http://www.trendmicro.com/us/enterprise/security-management/control-manager/index.html>
<http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_TMCM55_1823.txt>
<http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt>
There are no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23950795 Feedback>).
Group | Score | Vector |
---|---|---|
Base | 9 | AV:N/AC:M/Au:N/C:C/I:C/A:P |
Temporal | 7 | E:POC/RL:OF/RC:C |
Environmental | 2 | CDP:LM/TD:L/CR:ND/IR:ND/AR:ND |
Thanks to Tom Gregory for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2012-2998 |
---|---|
Date Public: | 2012-09-20 Date First Published: |
cwe.mitre.org/data/definitions/89.html
esupport.trendmicro.com/solution/en-us/1061043.aspx
jvn.jp/en/jp/JVN42014489/index.html
www.spentera.com/2012/09/trend-micro-control-manager-sql-injection-and-xss-vulnerability/
www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_TMCM55_1823.txt
www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt
www.trendmicro.com/us/enterprise/security-management/control-manager/index.html