Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
References
Link | Resource |
---|---|
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1117411 | Patch Vendor Advisory |
http://www.securitytracker.com/id/1038548 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/May/91 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-05-25 18:29
Updated : 2021-09-09 10:33
NVD link : CVE-2017-9037
Mitre link : CVE-2017-9037
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
trendmicro
- serverprotect