This vulnerability allows remote attackers to execute arbitrary SQL statements on vulnerable installations of Trend Micro Encryption for Email Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the formRegistration2 class. A crafted Client field in ppreg files can trigger execution of SQL queries composed from a user-supplied string. An attacker can leverage this vulnerability to execute code under the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Encryption for Email |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-18-415 vulnerability is classified as high severity due to its ability to allow remote execution of arbitrary SQL statements.
To fix ZDI-18-415, apply the latest security patch provided by Trend Micro for the Encryption for Email Gateway.
Attackers exploiting ZDI-18-415 can gain unauthorized access to the database and execute arbitrary SQL commands.
Yes, authentication is required to exploit ZDI-18-415, but the vulnerability allows bypassing the existing authentication mechanism.
ZDI-18-415 affects Trend Micro Encryption for Email Gateway installations.