Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote attackers to read and delete arbitrary files via the tmpfname parameter to (1) log_mgt_adhocquery_ajaxhandler.php, (2) log_mgt_ajaxhandler.php, (3) log_mgt_ajaxhandler.php or (4) tf parameter to wcs_bwlists_handler.php.
References
Link | Resource |
---|---|
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://success.trendmicro.com/solution/1114913 - Mitigation, Patch, Vendor Advisory |
Information
Published : 2017-01-30 22:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6269
Mitre link : CVE-2016-6269
CVE.ORG link : CVE-2016-6269
JSON object : View
Products Affected
trendmicro
- smart_protection_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')