// For flags

CVE-2017-6398

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. An authenticated user can execute a terminal command in the context of the web server user (which is root). Besides, the default installation of IMSVA comes with default administrator credentials. The saveCert.imss endpoint takes several user inputs and performs blacklisting. After that, it uses them as arguments to a predefined operating-system command without proper sanitization. However, because of an improper blacklisting rule, it's possible to inject arbitrary commands into it.

Se ha descubierto un problema en Trend Micro InterScan Messaging Security (Virtual Appliance) 9.1-1600. Un usuario autenticado puede ejecutar un comando terminal en el contexto del usuario del servidor web (que es root). Además, la instalación prederteminada de IMSVA viene con credenciales de administrador predeterminadas. El punto final saveCert.imss toma varias entradas de usuario y realiza listas negras. Después de esto, los utiliza como argumentos para un comando predefinido del sistema operativo sin la apropiada desinfección. Sin embargo, debido a una regla de lista negra incorrecta, es posible inyectar comandos arbitrarios en él.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-02-28 CVE Reserved
  • 2017-03-14 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trendmicro
Search vendor "Trendmicro"
Interscan Messaging Security Virtual Appliance
Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance"
9.1-1600
Search vendor "Trendmicro" for product "Interscan Messaging Security Virtual Appliance" and version "9.1-1600"
-
Affected