This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within processing of AdHocQuery_Processor. Due to the improper restriction of XML External Entity (XXE) reference, a specially crafted URI causes the XML parser to access the contents of this URI and embed these contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose sensitive information under the context of the Network Service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Control Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-18-111 is classified as high due to the potential for unauthorized information disclosure.
To fix ZDI-18-111, ensure that you apply the latest security patches provided by Trend Micro for Control Manager.
ZDI-18-111 allows for the disclosure of sensitive information that may be stored within vulnerable installations of Trend Micro Control Manager.
ZDI-18-111 affects installations of Trend Micro Control Manager that have not been updated to counter this vulnerability.
While authentication is required to exploit ZDI-18-111, the existing authentication mechanism can be bypassed, facilitating unauthorized access.