Trend Micro Control Manager AdHocQuery_Processor.aspx id Parameter SQL Injection

high Nessus Plugin ID 62628

Synopsis

The remote Windows host has a web application that is affected by a SQL injection vulnerability.

Description

Trend Micro Control Manager, a centralized threat and data protection management application, is installed on the remote Windows host and is potentially affected by a SQL injection vulnerability because the application fails to properly sanitize user-supplied input to the 'id' parameter of the AdHocQuery_Processor.aspx script.

By exploiting this flaw, a remote, authenticated attacker, could launch a SQL injection attack against the affected application, leading to the discovery of sensitive information, attacks against the underlying database, and the like.

Solution

Critical Patch - Build 1823 is available for Trend Micro Control Manager 5.5. Critical Patch - Build 1449 is available for Trend Micro Control Manager 6.0. If you are using an older version, upgrade to either 5.5 or 6.0 and apply the relevant patch.

See Also

http://www.nessus.org/u?4e442f79

https://success.trendmicro.com/solution/1061043

Plugin Details

Severity: High

ID: 62628

File Name: trendmicro_control_manager_id_sqli.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 10/18/2012

Updated: 12/4/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2012-2998

Vulnerability Information

CPE: cpe:/a:trend_micro:control_manager

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2012

Vulnerability Publication Date: 9/24/2012

Reference Information

CVE: CVE-2012-2998

BID: 55706

CERT: 950795