Published:2019/03/01  Last Updated:2019/03/01

JVNVU#99357827
Smart Protection Server vulnerable to OS command injection

Overview

Smart Protection Server contains an OS command injection vulnerability.

Products Affected

  • Smart Protection Server 3.1
  • Smart Protection Server 3.2 build 1074
  • Smart Protection Server 3.2 build 1078

Description

Smart Protection Server provided by Trend Micro Incorporated contains an OS command injection vulnerability (CWE-78).
The vendor's security bulletin says:  "In particular, cm_agent.php did not sanitize input parameters before executing a system command."

Impact

An arbitrary OS command may be executed by a user who can log on to the Product Console.

Solution

Use the latest installer
When installing the product for the first time, be sure to use the latest installer according to the information provided by the developer.

Apply a Workaround
According to the developer, when using Smart Protection Server 3.1, Smart Protection Server 3.2 build 1074, Smart Protection Server 3.2 build 1078, the administrator can manually remove the vulnerable script.

  • Log on to Smart Protection Server with root account, and execute the following command to remove the script file "cm_agent.php".
    rm -f /var/www/AdminUI/php/cm_agent.php

For more information, refer to the information provided by the developer.

References

  1. CORE Security
    CORE-2017-0004: Trend Micro Smart Protection OS Command Injection

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Trend Micro Incorporated and JPCERT/CC coordinated.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2017-11395
JVN iPedia