Published:2019/10/29  Last Updated:2019/10/29

JVNVU#96213168
Trend Micro OfficeScan vulnerable to directory traversal

Overview

Trend Micro OfficeScan contains a directory traversal vulnerability.

Products Affected

  • OfficeScan XG SP1 for Windows
  • OfficeScan XG (Non-SP GM build) for Windows
  • OfficeScan 11.0 SP1 for Windows

Description

Trend Micro OfficeScan contains a directory traversal vulnerability (CWE-22).
If this vulnerability is exploited, an authenticated user on the administrative console of the affected product may upload an arbitrary zip file to the specific folder, then extract and execute it.

Impact

An attacker with the privilege of the web service account that is used for the administrative console of OfficeScan may execute arbitrary code.

Solution

Apply the Patch
Apply the appropriate patch according to the information provided by the developer.
The developer has released the paches listed below that contain the countermeasure to this vulnerability.

  • OfficeScan XG SP1 CP 5427 for Windows
  • OfficeScan XG CP 1962 for Windows
  • OfficeScan 11.0 SP1 CP 6638 for Windows

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L
Base Score: 8.2
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:A/AC:L/Au:S/C:P/I:P/A:P
Base Score: 5.2
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Trend Micro Incorporated coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2019-18187
JVN iPedia