CVE-2018-3606 – Trend Micro Control Manager ThreatDistributedTrail SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3606
XXXStatusXXX, XXXSummary, TemplateXXX and XXXCompliance method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en los métodos XXXStatusXXX, XXXSummary, TemplateXXX y XXXCompliance en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ThreatDistributedTrail method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-083 https://www.zerodayinitiative.com/advisories/ZDI-18-085 https://www.zerodayinitiative.com/advisories/ZDI-18-086 https://www.zerodayinitiative.com/advisories/ZDI-18-089 https://www.zerodayinitiative.com/advisories/ZDI-18-091 https://www.zerodayinitiative.com/advisories/ZDI-18-092 https://www.zerodayinitiative.com/advisories/ZDI-18-093 https://www.zerodayinitiative.com/advisories/ZDI-18-099 https:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3607 – Trend Micro Control Manager ClearSelectedTreeNode SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3607
XXXTreeNode method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en el método XXXTreeNode en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ClearSelectedTreeNode method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-090 https://www.zerodayinitiative.com/advisories/ZDI-18-094 https://www.zerodayinitiative.com/advisories/ZDI-18-109 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3605 – Trend Micro Control Manager DLPIncidentJobWidget SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3605
TopXXX, ViolationXXX, and IncidentXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en los métodos TopXXX, ViolationXXX e IncidentXXX en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DLPIncidentJobWidget method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-069 https://www.zerodayinitiative.com/advisories/ZDI-18-070 https://www.zerodayinitiative.com/advisories/ZDI-18-071 https://www.zerodayinitiative.com/advisories/ZDI-18-072 https://www.zerodayinitiative.com/advisories/ZDI-18-073 https://www.zerodayinitiative.com/advisories/ZDI-18-074 https://www.zerodayinitiative.com/advisories/ZDI-18-075 https://www.zerodayinitiative.com/advisories/ZDI-18-076 https:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3601 – Trend Micro Control Manager TMCM_MembershipProvider ValidateUser Password Hash Usage Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2018-3601
A password hash usage authentication bypass vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to bypass authentication on vulnerable installations. Una vulnerabilidad de omisión de autenticación por uso de hash en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto omita la autenticación en instalaciones vulnerables. This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Trend Micro Control Manager. User interaction is not required to exploit this vulnerability. The specific flaw exists within the handling of challenges for authentication. The implementation of the challenge allows an attacker to authenticate to the system if they have possession of the password hash but not the password for a user. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-113 • CWE-287: Improper Authentication •
CVE-2018-3602 – Trend Micro Control Manager AdHocQuery_Processor ProductLogQuery SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3602
An AdHocQuery_Processor SQL injection remote code execution (RCE) vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en AdHocQuery_Processor en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the GetProductCategory method, which is called by the AdHocQuery_Processor servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-068 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •