{"vuid":"VU#950795","idnumber":"950795","name":"Trend Micro Control Manager adhoc query vulnerability","keywords":["Trend Micro Control Manager","adhoc","sql","cwe-89"],"overview":"Trend Micro Control Manager fails to properly filter user-supplied input within the ad hoc query module which could allow an attacker to upload and execute arbitrary code against the system.","clean_desc":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')\nTrend Micro Control Manager does not properly filter user-supplied input within the ad hoc query module. The successful exploitation of this vulnerability could potentially result in arbitrary SQL command  input to the backend database. A remote attacker can execute SQL commands to upload and execute arbitrary code against the system.","impact":"An attacker with access to the Trend Micro Control Manager web interface can conduct a sql injection attack, which could be used to result in information leakage, arbitrary code execution and/or denial of service.","resolution":"The vendor has stated that these vulnerabilities have been addressed in Trend Micro Control Manager version 5.5 and 6.0 critical patches. Users of Trend Micro Control Manager version 5.5 are advised to apply Critical Patch - Build 1823. Users of Trend Micro Control Manager version 6.0 are advised to apply Critical Patch - Build 1449.","workarounds":"Restrict access As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS, CSRF, or SQLi attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the Trend Micro Control Manager web interface using stolen credentials from a blocked network location.","sysaffected":"","thanks":"Thanks to Tom Gregory for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://www.trendmicro.com/us/enterprise/security-management/control-manager/index.html","http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_TMCM55_1823.txt","http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt","http://esupport.trendmicro.com/solution/en-us/1061043.aspx","http://www.spentera.com/2012/09/trend-micro-control-manager-sql-injection-and-xss-vulnerability/","http://cwe.mitre.org/data/definitions/89.html","http://jvn.jp/en/jp/JVN42014489/index.html"],"cveids":["CVE-2012-2998"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-07-24T20:40:42Z","publicdate":"2012-09-20T00:00:00Z","datefirstpublished":"2012-09-27T11:06:14Z","dateupdated":"2012-09-27T11:06:14Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"LM","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9","cvss_basevector":"AV:N/AC:M/Au:N/C:C/I:C/A:P","cvss_temporalscore":"7","cvss_environmentalscore":"2","cvss_environmentalvector":"CDP:LM/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}