Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1038548 | vdb entry third party advisory |
https://success.trendmicro.com/solution/1117411 | patch vendor advisory |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | exploit third party advisory technical description |
http://seclists.org/fulldisclosure/2017/May/91 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | exploit vdb entry third party advisory |