First published: Fri Apr 28 2017(Updated: )
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Threat Discovery Appliance | <=2.6.1062 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8589 is considered to have a high severity due to the potential for remote code execution as the root user.
To fix CVE-2016-8589, update Trend Micro Threat Discovery Appliance to version 2.6.1063 or later.
Exploiting CVE-2016-8589 allows remote authenticated users to execute arbitrary code on the vulnerable system with root privileges.
Users of Trend Micro Threat Discovery Appliance versions 2.6.1062r1 and earlier are affected by CVE-2016-8589.
CVE-2016-8589 represents a remote code execution vulnerability caused by improper input validation in a web application.