Directory traversal vulnerability in Trend Micro Control Manager 6.0 allows remote code execution by attackers able to drop arbitrary files in a web-facing directory. Formerly ZDI-CAN-4684.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100078 | |
http://www.securitytracker.com/id/1039049 | |
http://www.zerodayinitiative.com/advisories/ZDI-17-500 | Third Party Advisory VDB Entry |
https://success.trendmicro.com/solution/1117722 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/100078 | |
http://www.securitytracker.com/id/1039049 | |
http://www.zerodayinitiative.com/advisories/ZDI-17-500 | Third Party Advisory VDB Entry |
https://success.trendmicro.com/solution/1117722 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100078 - | |
References | () http://www.securitytracker.com/id/1039049 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-17-500 - Third Party Advisory, VDB Entry | |
References | () https://success.trendmicro.com/solution/1117722 - Patch, Vendor Advisory |
Information
Published : 2017-08-02 21:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11389
Mitre link : CVE-2017-11389
CVE.ORG link : CVE-2017-11389
JSON object : View
Products Affected
trendmicro
- control_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')