Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/6816 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6818 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6817 | vdb entry |
http://www.securityfocus.com/bid/3000 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html | vendor advisory mailing list |
http://www.securityfocus.com/bid/2996 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6819 | vdb entry |
http://www.securityfocus.com/bid/2998 | vdb entry |