dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/142221/Trend-Micro-Threat-Discovery-Appliance-2.6.1062r1-dlp_policy_upload.cgi-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/98508 |
Configurations
Information
Published : 2017-04-28 12:59
Updated : 2017-05-24 18:29
NVD link : CVE-2016-8587
Mitre link : CVE-2016-8587
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
trendmicro
- threat_discovery_appliance