lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <26563eca0606230616u61b99593x9e5a1e67df044822@mail.gmail.com>
Date: Fri, 23 Jun 2006 09:17:05 -0400
From: "Darren Bounds" <dbounds@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Trend Micro Control Manager (TMCM) Persistent XSS
	Vulnerability


Trend Micro Control Manager (TMCM) Persistent XSS Vulnerability
June 23, 2006

Product Overview:
Trend Micro Control Manager is a centralized, web-based outbreak
management console designed to simplify enterprise-wide coordination
of outbreak security actions and management of Trend Micro products
and services. Trend Micro Control Manager acts as a central command
center for deployment of Trend Micro's threat-specific expertise
across the network and to select third-party products to proactively
manage outbreaks.

Vulnerability Details:
Trend Micro Control Manager is vulnerable to a persistent,
unauthenticated XSS attack. This vulnerability can be exploited by an
attacker to obtain full administrative access to the TMCM
administration console, compromising the integrity of the corporate
enterprise anti-virus infrastructure.

This vulnerability stems from TMCMs failure to sanitize audit log
content when displaying it through the management console. As such, an
attacker may inject script into the username field at the login page.
Any logins, failed or successful are then available in the Access Log
for execution when viewed by an authenticated administrative user.

Affected Versions:
Trend Micro Control Manager 3.5
Olders versions may also be affected.

Workarounds:
Control network access to the TMCM web console.

References:
http://www.trendmicro.com/en/products/management/tmcm/

Vendor was contacted on several occasions with no response.


-- 

Thank you,
Darren Bounds

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ