CVE-2017-14078 – Trend Micro Mobile Security for Enterprise get_moveto_group_list Device_DeviceId SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2017-14078
SQL Injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. Varias vulnerabilidades de inyección SQL en las versiones anteriores a 9.7 Patch 3 de Trend Micro Mobile Security (Enterprise) permiten que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Mobile Security for Enterprise. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of the get_moveto_group_list action. When parsing the 'id' field, the process does not properly validate a user-supplied string before using it to construct SQL queries. • http://www.securityfocus.com/bid/100966 http://www.zerodayinitiative.com/advisories/ZDI-17-739 http://www.zerodayinitiative.com/advisories/ZDI-17-740 http://www.zerodayinitiative.com/advisories/ZDI-17-741 http://www.zerodayinitiative.com/advisories/ZDI-17-742 http://www.zerodayinitiative.com/advisories/ZDI-17-743 http://www.zerodayinitiative.com/advisories/ZDI-17-744 http://www.zerodayinitiative.com/advisories/ZDI-17-745 http://www.zerodayinitiative.com/advisories/ZDI-17-746 http://www.zer • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2017-14081 – Trend Micro Mobile Security for Enterprise Proxy Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2017-14081
Proxy command injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. Varias vulnerabilidades de inyección de comandos proxy en las versiones anteriores a 9.7 Patch 3 de Trend Micro Mobile Security (Enterprise) permiten que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Mobile Security for Enterprise. Authentication is required to exploit this vulnerability. The specific flaw exists within the modTMCSS Proxy functionality. When parsing certain parameters and "type" is set to "WR," the process does not properly validate a user-supplied string before using it to execute a system call. • http://www.securityfocus.com/bid/100969 http://www.zerodayinitiative.com/advisories/ZDI-17-752 http://www.zerodayinitiative.com/advisories/ZDI-17-774 https://success.trendmicro.com/solution/1118224 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2017-14080 – Trend Micro Mobile Security for Enterprise widgetforsecurity talker Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2017-14080
Authentication bypass vulnerability in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allows attackers to access a specific part of the console using a blank password. Una vulnerabilidad de omisión de autenticación en las versiones anteriores a 9.7 Patch 3 de Trend Micro Mobile Security (Enterprise) permite que atacantes remotos accedan a una parte específica de la consola empleando una contraseña en blanco. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Mobile Security for Enterprise. Authentication is not required to exploit this vulnerability. The specific flaw exists within the initialization of the users table in the tmwf database. When processing an attempt to login a user by an email address, the system can bypass password authentication. • http://www.zerodayinitiative.com/advisories/ZDI-17-767 https://success.trendmicro.com/solution/1118224 • CWE-287: Improper Authentication •
CVE-2017-11391 – Trend Micro InterScan Messaging Security Proxy Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2017-11391
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744. Una vulnerabilidad de inyección de comandos proxy en Trend Micro InterScan Messaging Virtual Appliance 9.0 y 9.1 permite que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. Este fallo específico puede explotarse parseando el parámetro "t" en modMCSS Proxy. • http://www.securityfocus.com/bid/100075 http://www.zerodayinitiative.com/advisories/ZDI-17-502 https://success.trendmicro.com/solution/1117723 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2017-11392 – Trend Micro InterScan Messaging Security Proxy Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2017-11392
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745. Una vulnerabilidad de inyección de comandos proxy en Trend Micro InterScan Messaging Virtual Appliance 9.0 y 9.1 permite que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. Este fallo específico puede explotarse parseando el parámetro "T" en modTMCSS Proxy. • http://www.securityfocus.com/bid/100075 http://www.zerodayinitiative.com/advisories/ZDI-17-504 https://success.trendmicro.com/solution/1117723 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •