Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38jr-7vx6-v3p4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.

Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.

EPSS

Процентиль: 85%
0.02677
Низкий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.

EPSS

Процентиль: 85%
0.02677
Низкий

Дефекты

CWE-434