{"api_version":"1","generated_at":"2026-04-23T11:34:05+00:00","cve":"CVE-2018-6230","urls":{"html":"https://cve.report/CVE-2018-6230","api":"https://cve.report/api/cve/CVE-2018-6230.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-6230","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-6230"},"summary":{"title":"CVE-2018-6230","description":"A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.","state":"PUBLIC","assigner":"security@trendmicro.com","published_at":"2018-03-15 19:29:00","updated_at":"2018-04-04 13:22:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities","name":"https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities","refsource":"MISC","tags":["Exploit","Technical Description","Third Party Advisory"],"title":"Trend Micro Email Encryption Gateway Multiple Vulnerabilities | SecureAuth","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://success.trendmicro.com/solution/1119349","name":"https://success.trendmicro.com/solution/1119349","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"New build to resolve multiple vulnerabilities - Trend Micro Email Encryption Gateway","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.exploit-db.com/exploits/44166/","name":"44166","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities - JSP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-6230","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6230","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"6230","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"email_encryption_gateway","cpe6":"5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"6230","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"email_encryption_gateway","cpe6":"5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@trendmicro.com","ID":"CVE-2018-6230","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Trend Micro Email Encryption Gateway","version":{"version_data":[{"version_value":"5.5"}]}}]},"vendor_name":"Trend Micro"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"SQL Injection"}]}]},"references":{"reference_data":[{"name":"44166","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/44166/"},{"name":"https://success.trendmicro.com/solution/1119349","refsource":"CONFIRM","url":"https://success.trendmicro.com/solution/1119349"},{"name":"https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities","refsource":"MISC","url":"https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities"}]}},"nvd":{"publishedDate":"2018-03-15 19:29:00","lastModifiedDate":"2018-04-04 13:22:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C","accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":8.3},"severity":"HIGH","exploitabilityScore":6.5,"impactScore":10,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:email_encryption_gateway:5.5:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"6230","Ordinal":"122287","Title":"CVE-2018-6230","CVE":"CVE-2018-6230","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"6230","Ordinal":"1","NoteData":"A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"6230","Ordinal":"2","NoteData":"2018-03-15","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"6230","Ordinal":"3","NoteData":"2018-03-16","Type":"Other","Title":"Modified"}]}}}