CVE-2016-6269

Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote attackers to read and delete arbitrary files via the tmpfname parameter to (1) log_mgt_adhocquery_ajaxhandler.php, (2) log_mgt_ajaxhandler.php, (3) log_mgt_ajaxhandler.php or (4) tf parameter to wcs_bwlists_handler.php.
References
Link Resource
https://success.trendmicro.com/solution/1114913 Mitigation Patch Vendor Advisory
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ Exploit Technical Description Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:2.6:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:*

Information

Published : 2017-01-30 14:59

Updated : 2021-09-09 10:33


NVD link : CVE-2016-6269

Mitre link : CVE-2016-6269


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Advertisement

dedicated server usa

Products Affected

trendmicro

  • smart_protection_server