CVE-2020-27018

Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product's web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:20

Type Values Removed Values Added
References () https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ - Exploit, Third Party Advisory () https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ - Exploit, Third Party Advisory
References () https://success.trendmicro.com/solution/000279833 - Exploit, Vendor Advisory () https://success.trendmicro.com/solution/000279833 - Exploit, Vendor Advisory

Information

Published : 2020-11-09 23:15

Updated : 2024-11-21 05:20


NVD link : CVE-2020-27018

Mitre link : CVE-2020-27018

CVE.ORG link : CVE-2020-27018


JSON object : View

Products Affected

microsoft

  • windows

trendmicro

  • interscan_messaging_security_virtual_appliance
CWE
CWE-918

Server-Side Request Forgery (SSRF)