This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Encryption for Email Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the formChangePass class. When parsing the username parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to disclose sensitive information under the context of the database.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Encryption for Email |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-18-419 vulnerability has been rated as medium severity.
To fix ZDI-18-419, apply the latest security patches provided by Trend Micro for Encryption for Email Gateway.
ZDI-18-419 allows the disclosure of sensitive information that may include user credentials and configuration details.
Organizations using Trend Micro Encryption for Email Gateway are affected by ZDI-18-419.
Yes, while authentication is required, the vulnerability allows the existing authentication mechanism to be bypassed.