Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:32413
HistoryAug 24, 2015 - 12:00 a.m.

Trend Micro Deep Discovery XSS

2015-08-2400:00:00
vulners.com
17

[+] Credits: John Page aka hyp3rlinx

[+] Website: hyp3rlinx.altervista.org

[+] Source: http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-DDI-081815b.txt

Vendor:

www.trendmicro.com

Product:

Trend Micro Deep Discovery 3.7.1096

The Trend Micro Deep Discovery platform "enables you to detect,
analyze, and respond to today’s stealthy, targeted attacks
in real time." It may be deployed on a network as an appliance.

Vulnerability Type:

Cross Site Scripting (XSS)

CVE Reference:

CVE-2015-2872

Vulnerability Details:

http://esupport.trendmicro.com/solution/en-US/1112206.aspx

http://www.kb.cert.org/vuls/id/248692

Deep Discovery Inspector is vulnerable to XSS attacks that
could allow an unauthenticated user to execute malicious content.

On some legacy browsers like IE 7 with a low Security Level,
Deep Discovery Inspector is vulnerable to XSS that allows an
unauthenticated user to execute malicious content through the index.php
The widget implementation is vulnerable to XSS that allows an
unauthenticated user to execute malicious content.

Exploit code(s):

https://localhost/widget/index.php?menuUrl=1&contentUrl='"%25;alert('XSS+By+hyp3rlinx+\nMarch+2015')//

Disclosure Timeline:

Vendor Notification: March 26, 2015
August 18, 2015 : Public Disclosure

Exploitation Technique:

Remote

Severity Level:

Medium

Description:

Request Method(s): [+] GET

Vulnerable Product: [+] Trend Micro Deep Discovery 3.7.1096

Vulnerable Parameter(s): [+] contentURL

Affected Area(s): [+] Trend Micro Deep Discovery

===========================================================

[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.

by hyp3rlinx