Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/1119349 | Patch Vendor Advisory |
https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44166/ | Exploit Third Party Advisory VDB Entry |
https://success.trendmicro.com/solution/1119349 | Patch Vendor Advisory |
https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44166/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://success.trendmicro.com/solution/1119349 - Patch, Vendor Advisory | |
References | () https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities - Exploit, Technical Description, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44166/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-03-15 19:29
Updated : 2024-11-21 04:10
NVD link : CVE-2018-6222
Mitre link : CVE-2018-6222
CVE.ORG link : CVE-2018-6222
JSON object : View
Products Affected
trendmicro
- email_encryption_gateway
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')