Trend Micro OfficeScan Flaws Let Remote Users Conduct Cross-Site Scripting Attacks and Gain Elevated Privileges
Severity Rating: Medium
- Trend Micro OfficeScan version 11.0, XG (12.0)
Two vulnerabilities were reported in Trend Micro OfficeScan, which can be exploited by remote attackers to conduct cross-site scripting. The vulnerabilities reported are as follows:
1. The first vulnerability exists because the Web Reputation Service (WRS) does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Trend Micro OfficeScan software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
2. The second vulnerability exists because the web console may leak encrypted account passwords. A remote user can use the encrypted password to log on to the console and gain elevated privileges on the target system.
Users are advised to apply updates.
More information about the update is available on:
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street