An XML external entity injection (XXE) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an authenticated user to expose a normally protected configuration script.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/1119349 | Patch Vendor Advisory |
https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44166/ | Exploit Third Party Advisory VDB Entry |
https://success.trendmicro.com/solution/1119349 | Patch Vendor Advisory |
https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://www.exploit-db.com/exploits/44166/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://success.trendmicro.com/solution/1119349 - Patch, Vendor Advisory | |
References | () https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities - Exploit, Technical Description, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44166/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-03-15 19:29
Updated : 2024-11-21 04:10
NVD link : CVE-2018-6225
Mitre link : CVE-2018-6225
CVE.ORG link : CVE-2018-6225
JSON object : View
Products Affected
trendmicro
- email_encryption_gateway
CWE
CWE-611
Improper Restriction of XML External Entity Reference