A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://success.trendmicro.com/solution/1118372 | mitigation vendor advisory |
http://www.securityfocus.com/archive/1/541267/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html | exploit vdb entry third party advisory |
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt | third party advisory exploit |
http://www.securityfocus.com/bid/101074 | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2017/Sep/86 | mailing list exploit third party advisory |
http://www.securitytracker.com/id/1039500 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/42895/ | exploit vdb entry third party advisory |