CVE-2016-7552

CRITICAL NUCLEI

Trendmicro Threat Discovery Appliance - Path Traversal

Title source: rule

Description

On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.

Exploits (1)

metasploit WORKING POC EXCELLENT
by mr_me <[email protected]>, Roberto Suggi Liverani @malerisch · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi.rb

Nuclei Templates (1)

Trend Micro Threat Discovery Appliance 2.6.1062r1 - Authentication Bypass
CRITICALby dwisiswant0

Scores

CVSS v3 9.8
EPSS 0.9298
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-22
Status draft

Affected Products (1)

trendmicro/threat_discovery_appliance

Timeline

Published Apr 12, 2017
Tracked Since Feb 18, 2026