Trend Micro Data Loss Prevention Virtual Appliance Encoded Traversal Arbitrary File Access

medium Nessus Plugin ID 55456

Synopsis

The remote web server hosts an application that is prone to a directory traversal attack.

Description

The instance of Trend Micro Data Loss Prevention Web Console listening on this port allows an unauthenticated, remote attacker to retrieve arbitrary files through its web server using specially crafted requests with encoded directory traversal sequences.

This can result in the disclosure of sensitive information, such as the appliance's /etc/password file and other sensitive files.

Solution

At the time of this writing, there is no vendor solution.

Plugin Details

Severity: Medium

ID: 55456

File Name: trendmicro_dlpva_dir_traversal.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 6/29/2011

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/trendmicro_dlpva_web_console

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 6/11/2011

Reference Information

BID: 48225