CVE-2020-27018
Summary
| CVE | CVE-2020-27018 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-09 23:15:00 UTC |
| Updated | 2020-11-24 18:26:00 UTC |
| Description | Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product's web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability. |
Risk And Classification
Problem Types: CWE-918
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Microsoft | Windows | - | All | All | All |
| Operating System | Microsoft | Windows | - | All | All | All |
| Application | Trendmicro | Interscan Messaging Security Virtual Appliance | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerabilities In Trend Micro Interscan Messaging Security Virtual Appliance (IMSVA) | N/A | sec-consult.com | Exploit, Third Party Advisory |
| SECURITY BULLETIN: Multiple Vulnerabilities in Trend Micro InterScan Messaging Virtual Appliance (IMSVA) 9.1 | N/A | success.trendmicro.com | Exploit, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.