The handle_certificate function in /vmi/manager/engine/management/commands/apns_worker.py in Trend Micro Virtual Mobile Infrastructure before 5.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the password to api/v1/cfg/oauth/save_identify_pfx/.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95884 | Third Party Advisory VDB Entry |
https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1115411 | Vendor Advisory |
http://www.securityfocus.com/bid/95884 | Third Party Advisory VDB Entry |
https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1115411 | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/95884 - Third Party Advisory, VDB Entry | |
References | () https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ - Exploit, Technical Description, Third Party Advisory | |
References | () https://success.trendmicro.com/solution/1115411 - Vendor Advisory |
Information
Published : 2017-01-30 22:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6270
Mitre link : CVE-2016-6270
CVE.ORG link : CVE-2016-6270
JSON object : View
Products Affected
trendmicro
- virtual_mobile_infrastructure
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')