Skip Ribbon Commands
Skip to main content
Computer Security Incident Response Team of Mauritius (CERT-MU)

VN-2017-64


Trend Micro OfficeScan Flaws Let Remote Users Conduct Cross-Site Scripting Attacks and Gain Elevated Privileges
Severity Rating: Medium
Systems Affected:
  • Trend Micro OfficeScan version 11.0, XG (12.0)
Description
Two vulnerabilities were reported in Trend Micro OfficeScan, which can be exploited by remote attackers to conduct cross-site scripting. The vulnerabilities reported are as follows:
 
1.     The first vulnerability exists because the Web Reputation Service (WRS) does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Trend Micro OfficeScan software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
 
2.     The second vulnerability exists because the web console may leak encrypted account passwords. A remote user can use the encrypted password to log on to the console and gain elevated privileges on the target system.
 
Solution
Users are advised to apply updates.
More information about the update is available on:
 
Vendor Information
TrendMicro
 
References
TrendMicro
 
SecurityTracker
 
Contact Information
 
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis