Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows local webserv users to execute arbitrary code with root privileges via a Trojan horse .war file in the Solr webapps directory.
References
Link | Resource |
---|---|
https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory |
https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Sep 2021, 17:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:trend_micro:smart_protection_server:2.6:*:*:*:*:*:*:* cpe:2.3:a:trend_micro:smart_protection_server:2.5:*:*:*:*:*:*:* |
cpe:2.3:a:trendmicro:smart_protection_server:2.6:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:smart_protection_server:2.5:*:*:*:*:*:*:* cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:* |
Information
Published : 2017-01-30 22:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-6268
Mitre link : CVE-2016-6268
CVE.ORG link : CVE-2016-6268
JSON object : View
Products Affected
trendmicro
- smart_protection_server
CWE
CWE-264
Permissions, Privileges, and Access Controls