// For flags

CVE-2017-11393

Trend Micro OfficeScan Proxy Command Injection Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the tr parameter within Proxy.php. Formerly ZDI-CAN-4543.

La vulnerabilidad de inyección de comandos proxy en Trend Micro OfficeScan 11 y XG (12) permite que atacantes remotos puedan ejecutar código arbitrario en instalaciones vulnerables. Este error específico se puede explotar parseando el parámetro tr en Proxy.php. Anteriormente ZDI-CAN-4543.

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan. Authentication is required to exploit this vulnerability.
The specific flaw exists within the Web Console, which listens on TCP port 4343 by default. When parsing the tr parameter in Proxy.php, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current service.

*Credits: Steven Seeley of Source Incite
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-07-17 CVE Reserved
  • 2017-08-03 CVE Published
  • 2023-11-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trendmicro
Search vendor "Trendmicro"
Officescan
Search vendor "Trendmicro" for product "Officescan"
11.0
Search vendor "Trendmicro" for product "Officescan" and version "11.0"
sp1
Affected
Trendmicro
Search vendor "Trendmicro"
Officescan
Search vendor "Trendmicro" for product "Officescan"
12.0
Search vendor "Trendmicro" for product "Officescan" and version "12.0"
-
Affected