CVE-2017-11395

Command injection vulnerability in Trend Micro Smart Protection Server (Standalone) 3.1 and 3.2 server administration UI allows attackers with authenticated access to execute arbitrary code on vulnerable installations.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:smart_protection_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection - Exploit, Third Party Advisory () http://www.coresecurity.com/advisories/trend-micro-smart-protection-os-command-injection - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/100461 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100461 - Third Party Advisory, VDB Entry
References () https://success.trendmicro.com/solution/1117933 - Mitigation, Patch, Vendor Advisory () https://success.trendmicro.com/solution/1117933 - Mitigation, Patch, Vendor Advisory

Information

Published : 2017-09-22 16:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11395

Mitre link : CVE-2017-11395

CVE.ORG link : CVE-2017-11395


JSON object : View

Products Affected

trendmicro

  • smart_protection_server
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')