search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Trend Micro Control Manager adhoc query vulnerability

Vulnerability Note VU#950795

Original Release Date: 2012-09-27 | Last Revised: 2012-09-27

Overview

Trend Micro Control Manager fails to properly filter user-supplied input within the ad hoc query module which could allow an attacker to upload and execute arbitrary code against the system.

Description

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Trend Micro Control Manager does not properly filter user-supplied input within the ad hoc query module. The successful exploitation of this vulnerability could potentially result in arbitrary SQL command input to the backend database. A remote attacker can execute SQL commands to upload and execute arbitrary code against the system.

Impact

An attacker with access to the Trend Micro Control Manager web interface can conduct a sql injection attack, which could be used to result in information leakage, arbitrary code execution and/or denial of service.

Solution

The vendor has stated that these vulnerabilities have been addressed in Trend Micro Control Manager version 5.5 and 6.0 critical patches.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the Trend Micro Control Manager web interface using stolen credentials from a blocked network location.

Vendor Information

950795
Expand all

Trend Micro

Notified:  August 03, 2012 Updated:  September 21, 2012

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Users of Trend Micro Control Manager version 5.5 are advised to apply Critical Patch - Build 1823.

Vendor References

http://www.trendmicro.com/us/enterprise/security-management/control-manager/index.html http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_TMCM55_1823.txt http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 9.0 AV:N/AC:M/Au:N/C:C/I:C/A:P
Temporal 7.0 E:POC/RL:OF/RC:C
Environmental 2 CDP:LM/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Tom Gregory for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-2998
Date Public: 2012-09-20
Date First Published: 2012-09-27
Date Last Updated: 2012-09-27 11:06 UTC
Document Revision: 18

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.