The HTTP server in Trend Micro Password Manager allows remote web servers to execute arbitrary commands via the url parameter to (1) api/openUrlInDefaultBrowser or (2) api/showSB.
References
Configurations
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.trendmicro.com/information-on-reported-vulnerabilities-in-trend-micro-password-manager/ - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/135222/TrendMicro-Node.js-HTTP-Server-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1034662 - Third Party Advisory, VDB Entry | |
References | () https://code.google.com/p/google-security-research/issues/detail?id=693 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39218/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2016-04-12 02:00
Updated : 2024-11-21 02:51
NVD link : CVE-2016-3987
Mitre link : CVE-2016-3987
CVE.ORG link : CVE-2016-3987
JSON object : View
Products Affected
trendmicro
- password_manager
CWE
CWE-284
Improper Access Control