First published: Fri May 26 2017(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9032 is classified as a critical vulnerability due to its potential to allow remote attackers to execute arbitrary scripts.
To mitigate CVE-2017-9032, it is recommended to update Trend Micro ServerProtect for Linux to the latest version or apply the necessary patches provided by the vendor.
CVE-2017-9032 affects the log_management.cgi component within Trend Micro ServerProtect for Linux version 3.0.
Yes, CVE-2017-9032 can be exploited remotely, allowing unauthorized users to inject malicious scripts.
Exploitation of CVE-2017-9032 may lead to unintended script execution, which can display unauthorized content or compromise user sessions.