CVE-2017-11392
Trend Micro InterScan Messaging Security Proxy Command Injection Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745.
Una vulnerabilidad de inyección de comandos proxy en Trend Micro InterScan Messaging Virtual Appliance 9.0 y 9.1 permite que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. Este fallo específico puede explotarse parseando el parámetro "T" en modTMCSS Proxy. Anteriormente, esta vulnerabilidad se denominaba ZDI-CAN-4745.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro InterScan Messaging Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the modTMCSS Proxy functionality. When parsing the "T" parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute arbitrary code under the context of the imss user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-17 CVE Reserved
- 2017-07-31 CVE Published
- 2024-09-17 CVE Updated
- 2024-11-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/100075 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-17-504 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://success.trendmicro.com/solution/1117723 | 2017-08-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trendmicro Search vendor "Trendmicro" | Interscan Messaging Security Virtual Appliance Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance" | 9.0 Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance" and version "9.0" | - |
Affected
| ||||||
Trendmicro Search vendor "Trendmicro" | Interscan Messaging Security Virtual Appliance Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance" | 9.1 Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance" and version "9.1" | - |
Affected
|