This vulnerability allows remote attackers to execute arbitrary SQL statements on vulnerable installations of Trend Micro Encryption for Email Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the formRequestDomains class. When parsing the hidDomains parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Encryption for Email Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-18-420 is critical due to the ability of remote attackers to execute arbitrary SQL statements.
To fix ZDI-18-420, ensure that you update to the latest version of Trend Micro Encryption for Email Gateway, which addresses this vulnerability.
ZDI-18-420 enables remote attackers to bypass authentication and execute arbitrary SQL commands on the vulnerable system.
ZDI-18-420 impacts the existing authentication mechanisms by allowing them to be bypassed, leading to potential exploitation.
Organizations using vulnerable versions of Trend Micro Encryption for Email Gateway are affected by ZDI-18-420.