A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
References
Link | Resource |
---|---|
https://success.trendmicro.com/solution/1118372 | Mitigation Vendor Advisory |
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/42895/ | Exploit Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039500 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/101074 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Sep/86 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/541267/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-10-05 18:29
Updated : 2018-10-09 13:01
NVD link : CVE-2017-14087
Mitre link : CVE-2017-14087
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
trendmicro
- officescan