SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Trend Micro Control Manager Vendors:   Trend Micro
Trend Micro Control Manager Input Validation Hole Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1016372
SecurityTracker URL:  http://securitytracker.com/id/1016372
CVE Reference:   CVE-2006-3261   (Links to External Site)
Updated:  May 11 2009
Original Entry Date:  Jun 24 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 3.5
Description:   A vulnerability was reported in Trend Micro Control Manager. A remote user can conduct cross-site scripting attacks.

The software does not properly filter HTML code from user-supplied input in the audit log before displaying the input. A remote user can submit a specially crafted username value. Then, when the log is displayed by a target, authenticated administrative user, arbitrary scripting code will be executed by the target user's browser. The code will originate from the site running the Trend Micro Control Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The vendor was notified without response.

Darren Bounds reported this vulnerability.

Impact:   A remote user can access the target administrative user's cookies (including authentication cookies), if any, associated with the site running the Trend Micro Control Manager software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.trendmicro.com/en/products/management/tmcm/evaluate/overview.htm (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (NT), Windows (2000), Windows (2003)

Message History:   None.


 Source Message Contents

Subject:  Trend Micro Control Manager (TMCM) Persistent XSS Vulnerability

Trend Micro Control Manager (TMCM) Persistent XSS Vulnerability
June 23, 2006

Product Overview:
Trend Micro Control Manager is a centralized, web-based outbreak
management console designed to simplify enterprise-wide coordination
of outbreak security actions and management of Trend Micro products
and services. Trend Micro Control Manager acts as a central command
center for deployment of Trend Micro's threat-specific expertise
across the network and to select third-party products to proactively
manage outbreaks.

Vulnerability Details:
Trend Micro Control Manager is vulnerable to a persistent,
unauthenticated XSS attack. This vulnerability can be exploited by an
attacker to obtain full administrative access to the TMCM
administration console, compromising the integrity of the corporate
enterprise anti-virus infrastructure.

This vulnerability stems from TMCMs failure to sanitize audit log
content when displaying it through the management console. As such, an
attacker may inject script into the username field at the login page.
Any logins, failed or successful are then available in the Access Log
for execution when viewed by an authenticated administrative user.

Affected Versions:
Trend Micro Control Manager 3.5
Olders versions may also be affected.

Workarounds:
Control network access to the TMCM web console.

References:
http://www.trendmicro.com/en/products/management/tmcm/

Vendor was contacted on several occasions with no response.


-- 

Thank you,
Darren Bounds

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC