|
|||
Rule General Information |
---|
Release Date: | 2019-06-24 | |
Rule Name: | Trend Micro Threat Discovery Appliance Directory Traversal Authentication Bypass Vulnerability (CVE-2016-7552) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:97599 https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.trendmicro.com/ |