Trend Micro InterScan Web Security Virtual Appliance ConfigIPNetwork saveNetworkConfiguration datagateIPv6Changed Command Injection Remote Code Execution Vulnerability

2017-03-30T00:00:00
ID ZDI-17-231
Type zdi
Reporter Steven Seeley of Source Incite
Modified 2017-03-30T00:00:00

Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro InterScan Web Security Virtual Appliance. Authentication is required to exploit this vulnerability.

The specific flaw exists within ConfigIPNetwork's saveNetworkConfiguration method. A crafted IPv6 data gateway network parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute arbitrary code under the context of root.