|    |    |    | Today: 21-Sep-2019 |

Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution

November 1, 2017 | Posted in ExploitAlert

This Metasploit module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. WizardSetting_sys.imss endpoint takes several user inputs and performs LAN settings. After that it use them as argument of predefined operating system command without proper sanitation. It's possible to inject arbitrary commands into it. InterScan Messaging Security prior to 9.1.-1600 affected by this issue.


Source: Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution

Taged in: Exploit