CVE-2017-6340
MEDIUMTrendmicro Interscan Web Security Virtual Appliance < 6.5 - XSS
Title source: ruleDescription
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 does not sanitize a rest/commonlog/report/template name field, which allows a 'Reports Only' user to inject malicious JavaScript while creating a new report. Additionally, IWSVA implements incorrect access control that allows any authenticated, remote user (even with low privileges like 'Auditor') to create or modify reports, and consequently take advantage of this XSS vulnerability. The JavaScript is executed when victims visit reports or auditlog pages.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by SlidingWindow · textwebappshardware
https://www.exploit-db.com/exploits/42013
References (3)
Core 3
Core References
Patch, Vendor Advisory x_refsource_misc
https://success.trendmicro.com/solution/1116960
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/97487
Exploit, Technical Description, Third Party Advisory x_refsource_misc
https://www.qualys.com/2017/01/12/qsa-2017-01-12/qsa-2017-01-12.pdf
Scores
CVSS v3
5.4
EPSS
0.0023
EPSS Percentile
45.3%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
trendmicro/interscan_web_security_virtual_appliance
< 6.5
Published
Apr 05, 2017
Tracked Since
Feb 18, 2026