Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows local webserv users to execute arbitrary code with root privileges via a Trojan horse .war file in the Solr webapps directory.
References
Link | Resource |
---|---|
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://success.trendmicro.com/solution/1114913 - Mitigation, Patch, Vendor Advisory |
Information
Published : 2017-01-30 22:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6268
Mitre link : CVE-2016-6268
CVE.ORG link : CVE-2016-6268
JSON object : View
Products Affected
trendmicro
- smart_protection_server
CWE
CWE-264
Permissions, Privileges, and Access Controls