A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Sep/86 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/541267/100/0/threaded | |
http://www.securityfocus.com/bid/101074 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039500 | Third Party Advisory VDB Entry |
https://success.trendmicro.com/solution/1118372 | Mitigation Vendor Advisory |
https://www.exploit-db.com/exploits/42895/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-10-06 01:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-14087
Mitre link : CVE-2017-14087
CVE.ORG link : CVE-2017-14087
JSON object : View
Products Affected
trendmicro
- officescan
CWE
CWE-20
Improper Input Validation