Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote attackers to read and delete arbitrary files via the tmpfname parameter to (1) log_mgt_adhocquery_ajaxhandler.php, (2) log_mgt_ajaxhandler.php, (3) log_mgt_ajaxhandler.php or (4) tf parameter to wcs_bwlists_handler.php.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-01-30 14:59
Updated : 2021-09-09 10:33
NVD link : CVE-2016-6269
Mitre link : CVE-2016-6269
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
trendmicro
- smart_protection_server