CVE-2016-7552

Published on: 04/12/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Threat Discovery Appliance from Trendmicro contain the following vulnerability:

On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.

  • CVE-2016-7552 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 10 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Added CVE-2016-7552/CVE-2016-7547 exploit by stevenseeley · Pull Request #8216 · rapid7/metasploit-framework · GitHub Exploit
Third Party Advisory
github.com
text/html
URL Logo MISC github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6
Trend Micro Threat Discovery Appliance CVE-2016-7552 Directory Traversal Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 97599

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationTrendmicroThreat Discovery Appliance2.6.1062r1AllAll
ApplicationTrendmicroThreat Discovery Appliance2.6.1062r1AllAll
  • cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*:
  • cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*: