First published: Fri May 26 2017(Updated: )
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9033 is considered a high severity cross-site request forgery (CSRF) vulnerability.
To fix CVE-2017-9033, update Trend Micro ServerProtect for Linux to the latest version or apply the available patches.
CVE-2017-9033 affects Trend Micro ServerProtect for Linux version 3.0 before CP 1531.
Yes, CVE-2017-9033 can be exploited remotely by attackers to hijack user authentication.
CVE-2017-9033 is associated with a cross-site request forgery (CSRF) attack.