Trend Micro Deep Discovery threat appliance contains multiple vulnerabilities
Vulnerability Note VU#248692
Original Release Date: 2015-08-18 | Last Revised: 2015-08-18
Multiple versions of the Trend Micro Deep Discovery threat appliance are vulnerable to cross-site scripting and authentication bypass.
The Trend Micro Deep Discovery platform "enables you to detect, analyze, and respond to today’s stealthy, targeted attacks in real time." It may be deployed on a network as an appliance. The Trend Micro Deep Discovery Threat Appliance version 3.7.1096 is vulnerable to cross-site scripting and authentication bypass.
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2015-2872
The contentURL parameter of a request to index.html is not properly validated and vulnerable to reflected cross-site scripting.
CWE-425: Direct Request ('Forced Browsing') - CVE-2015-2873
Several URLs, including the system log, whitelist, and blacklist, are accessible to a non-administrator user by direct request. The pages do not properly check for authorization.
Trend Micro has released an advisory on these issues. The CVSS score below is based on CVE-2015-2873.
An authenticated user without administrator privileges may access and modify certain system configuration settings. An unauthenticated remote user may conduct cross-site scripting attacks.
Apply an update
Trend Micro has released updates to address this issue. Affected users are encouraged to update as soon as possible.
Affected versions are listed below with the patch number corresponding to the update (for example, if you use 3.8 English, update to 3.8.1263):
Affected Version (Version Number and Language)
Updated Patch Version (Versions prior to the one listed here may be affected)