Vulnerabilities > CVE-2017-11398 - DEPRECATED: Information Exposure Through Debug Log Files vulnerability in Trendmicro Smart Protection Server
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an unauthenticated attacker to hijack active user sessions to perform authenticated requests on a vulnerable system.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 5 |
Common Weakness Enumeration (CWE)
D2sec
name | Trend Micro Smart Protection Server Encryption Key Disclosure |
url | http://www.d2sec.com/exploits/trend_micro_smart_protection_server_encryption_key_disclosure.html |
Exploit-Db
description | Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored... |
file | exploits/multiple/remote/43388.md |
id | EDB-ID:43388 |
last seen | 2017-12-22 |
modified | 2017-12-19 |
platform | multiple |
port | |
published | 2017-12-19 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/43388/ |
title | Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Control |
type | remote |
Nessus
NASL family | CGI abuses |
NASL id | TRENDMICRO_SMART_PROTECTION_SERVER_CVE-2017-11398.NASL |
description | The Trend Micro Smart Protection Server running on the remote host is affected by a session hijacking vulnerability due to the disclosure of session IDs in the diagnostic.log file that can be accessed via HTTP without authentication. An unauthenticated, remote attacker can grab the log file and hijack active user sessions to perform authenticated requests. Note that the product is reportedly affected by other vulnerabilities; however, this plugin has not tested for them. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 107224 |
published | 2018-03-08 |
reporter | This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/107224 |
title | Trend Micro Smart Protection Server Session Hijacking Via Log File Disclosure |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/145518/CORE-2017-0008.txt |
id | PACKETSTORM:145518 |
last seen | 2017-12-22 |
published | 2017-12-22 |
reporter | Core Security Technologies |
source | https://packetstormsecurity.com/files/145518/Trend-Micro-Smart-Protection-Server-3.2-XSS-Access-Control-Disclosure.html |
title | Trend Micro Smart Protection Server 3.2 XSS / Access Control / Disclosure |
References
- http://www.securityfocus.com/bid/102275
- http://www.securityfocus.com/bid/102275
- https://success.trendmicro.com/solution/1118992
- https://success.trendmicro.com/solution/1118992
- https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities
- https://www.coresecurity.com/advisories/trend-micro-smart-protection-server-multiple-vulnerabilities
- https://www.exploit-db.com/exploits/43388/
- https://www.exploit-db.com/exploits/43388/