Trend Micro InterScan Web Security Virtual Appliance Bugs Let Remote Users Conduct Cross-Site Scripting Attacks and Let Remote Authenticated Users Execute Arbitrary Commands and Gain Elevated Privileges
Severity Rating: Medium
- Trend Micro InterScan Web Security Virtual Appliance version 6.5
Multiple vulnerabilities have been identified in Trend Micro InterScan Web Security Virtual Appliance and they can be exploited by remote attackers to gain elevated privileges, cause execution of arbitrary commands and conduct cross-site scripting attacks. The vulnerabilities reported are as follows:
· A vulnerability exists which can allow a remote authenticated user to submit a specially crafted HTTP request to modify the administrator password and gain elevated privileges on the target system.
· A vulnerability exists that can allow a remote authenticated user to send specially crafted data to execute arbitrary commands on the target system.
· A vulnerability exists because the software does not properly filter HTML code from user-supplied input before displaying the input. This can allow a remote user to cause arbitrary scripting code to be executed by the target user’s browser. The code will originate from the InterScan Web Security interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Users are advised to apply updates.
More information about the update is available on:
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street