Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c5w3-r59j-638h

Опубликовано: 01 фев. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.1

Описание

A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.

A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.

EPSS

Процентиль: 95%
0.19436
Средний

9.1 Critical

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 9.1
nvd
около 3 лет назад

A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.

CVSS3: 8.2
fstec
около 3 лет назад

Уязвимость антивирусного программного средства Apex One, вызванная недостатками процедуры авторизации, позволяющая нарушителю загрузить произвольные файлы в каталог SampleSubmission

EPSS

Процентиль: 95%
0.19436
Средний

9.1 Critical

CVSS3

Дефекты

CWE-434