Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-18187

Опубликовано: 28 окт. 2019
Источник: nvd
CVSS3: 7.5
CVSS3: 8.8
CVSS2: 5
EPSS Высокий

Описание

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.78453
Высокий

7.5 High

CVSS3

8.8 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-22
CWE-22

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

CVSS3: 6.7
fstec
больше 6 лет назад

Уязвимость средства антивирусной защиты Trend Micro OfficeScan, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.78453
Высокий

7.5 High

CVSS3

8.8 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-22
CWE-22