Vulnerability Note VU#950795
Trend Micro Control Manager adhoc query vulnerability
Trend Micro Control Manager fails to properly filter user-supplied input within the ad hoc query module which could allow an attacker to upload and execute arbitrary code against the system.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Trend Micro Control Manager does not properly filter user-supplied input within the ad hoc query module. The successful exploitation of this vulnerability could potentially result in arbitrary SQL command input to the backend database. A remote attacker can execute SQL commands to upload and execute arbitrary code against the system.
An attacker with access to the Trend Micro Control Manager web interface can conduct a sql injection attack, which could be used to result in information leakage, arbitrary code execution and/or denial of service.
The vendor has stated that these vulnerabilities have been addressed in Trend Micro Control Manager version 5.5 and 6.0 critical patches.
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the Trend Micro Control Manager web interface using stolen credentials from a blocked network location.
Vendor Information (Learn More)
If you are a vendor and your product is affected, let
|Vendor||Status||Date Notified||Date Updated|
|Trend Micro||Affected||03 Aug 2012||21 Sep 2012|
Thanks to Tom Gregory for reporting this vulnerability.
This document was written by Michael Orlando.
20 Sep 2012
Date First Published:
27 Sep 2012
Date Last Updated:
27 Sep 2012
If you have feedback, comments, or additional information about this vulnerability, please send us email.