A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations. Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the input before its usage in "require," "include," or similar functions.
Link | Tags |
---|---|
https://success.trendmicro.com/dcx/s/solution/000296153?language=en_US | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-024/ | third party advisory vdb entry |