Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product's web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability.
References
Link | Resource |
---|---|
https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ | Exploit Third Party Advisory |
https://success.trendmicro.com/solution/000279833 | Exploit Vendor Advisory |
https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ | Exploit Third Party Advisory |
https://success.trendmicro.com/solution/000279833 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec-consult.com/en/blog/advisories/vulnerabilities-in-trend-micro-interscan-messaging-security-virtual-appliance-imsva/ - Exploit, Third Party Advisory | |
References | () https://success.trendmicro.com/solution/000279833 - Exploit, Vendor Advisory |
Information
Published : 2020-11-09 23:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-27018
Mitre link : CVE-2020-27018
CVE.ORG link : CVE-2020-27018
JSON object : View
Products Affected
microsoft
- windows
trendmicro
- interscan_messaging_security_virtual_appliance
CWE
CWE-918
Server-Side Request Forgery (SSRF)