SB2023051302 - Multiple vulnerabilities in Trend Micro Mobile Security for Enterprise
Published: May 13, 2023 Updated: May 14, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2023-32521)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote non-authenticated attacker can send a specially crafted HTTP request and delete arbitrary files on the system.
2) PHP file inclusion (CVE-ID: CVE-2023-32528)
The vulnerability allows a remote user to include and execute arbitrary PHP files on the server.
The vulnerability exists due to incorrect input validation when including PHP files within the getWidgetPoolManager function defined in the web/widgetforsecurity path. A remote user can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.
3) Path traversal (CVE-ID: CVE-2023-32522)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote user can send a specially crafted HTTP request and delete arbitrary files on the system.
4) Improper Authentication (CVE-ID: CVE-2023-32523)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication within the WFUser class defined in the web/widget path. A remote attacker can bypass authentication process and gain unauthorized access to the application.
5) Improper Authentication (CVE-ID: CVE-2023-32524)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication within the WFUser class defined in the web/widgetforsecurity path. A remote attacker can bypass authentication process and gain unauthorized access to the application.
6) Arbitrary file upload (CVE-ID: CVE-2023-32525)
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload within the set_certificates_config action defined in the web/widget path. A remote user can upload a malicious file and execute it on the server.
7) Arbitrary file upload (CVE-ID: CVE-2023-32526)
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload within the set_certificates_config action defined in the web/widgetforsecurity path. A remote user can upload a malicious file and execute it on the server.
8) PHP file inclusion (CVE-ID: CVE-2023-32527)
The vulnerability allows a remote user to include and execute arbitrary PHP files on the server.
The vulnerability exists due to incorrect input validation when including PHP files within the getWidgetPoolManager function defined in the web/widget path. A remote user can send a specially crafted HTTP request to the affected application, include and execute arbitrary PHP code on the system with privileges of the web server.
Remediation
Install update from vendor's website.
References
- https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US
- https://www.zerodayinitiative.com/advisories/ZDI-23-591/
- https://www.zerodayinitiative.com/advisories/ZDI-23-587/
- https://www.zerodayinitiative.com/advisories/ZDI-23-588/
- https://www.zerodayinitiative.com/advisories/ZDI-23-589/
- https://www.zerodayinitiative.com/advisories/ZDI-23-586/
- https://www.zerodayinitiative.com/advisories/ZDI-23-590/