CVE-2018-3605 – Trend Micro Control Manager DLPIncidentJobWidget SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3605
TopXXX, ViolationXXX, and IncidentXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en los métodos TopXXX, ViolationXXX e IncidentXXX en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DLPIncidentJobWidget method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-069 https://www.zerodayinitiative.com/advisories/ZDI-18-070 https://www.zerodayinitiative.com/advisories/ZDI-18-071 https://www.zerodayinitiative.com/advisories/ZDI-18-072 https://www.zerodayinitiative.com/advisories/ZDI-18-073 https://www.zerodayinitiative.com/advisories/ZDI-18-074 https://www.zerodayinitiative.com/advisories/ZDI-18-075 https://www.zerodayinitiative.com/advisories/ZDI-18-076 https:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3601 – Trend Micro Control Manager TMCM_MembershipProvider ValidateUser Password Hash Usage Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2018-3601
A password hash usage authentication bypass vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to bypass authentication on vulnerable installations. Una vulnerabilidad de omisión de autenticación por uso de hash en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto omita la autenticación en instalaciones vulnerables. This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Trend Micro Control Manager. User interaction is not required to exploit this vulnerability. The specific flaw exists within the handling of challenges for authentication. The implementation of the challenge allows an attacker to authenticate to the system if they have possession of the password hash but not the password for a user. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-113 • CWE-287: Improper Authentication •
CVE-2018-3602 – Trend Micro Control Manager AdHocQuery_Processor ProductLogQuery SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3602
An AdHocQuery_Processor SQL injection remote code execution (RCE) vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en AdHocQuery_Processor en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the GetProductCategory method, which is called by the AdHocQuery_Processor servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-068 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3604 – Trend Micro Control Manager GetChannelList SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-3604
GetXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en el método GetXXX en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the GetChannelList method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-067 https://www.zerodayinitiative.com/advisories/ZDI-18-084 https://www.zerodayinitiative.com/advisories/ZDI-18-088 https://www.zerodayinitiative.com/advisories/ZDI-18-095 https://www.zerodayinitiative.com/advisories/ZDI-18-096 https://www.zerodayinitiative.com/advisories/ZDI-18-097 https://www.zerodayinitiative.com/advisories/ZDI-18-102 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-3600 – Trend Micro Control Manager AdHocQuery_Processor External Entity Processing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2018-3600
A external entity processing information disclosure (XXE) vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to disclose sensitive information on vulnerable installations. Una vulnerabilidad de revelación de información de procesamiento de entidades externas (XEE) en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto revele información sensible en instalaciones vulnerables. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within processing of AdHocQuery_Processor. Due to the improper restriction of XML External Entity (XXE) reference, a specially crafted URI causes the XML parser to access the contents of this URI and embed these contents back into the XML document for further processing. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-111 • CWE-611: Improper Restriction of XML External Entity Reference •