This vulnerability allows remote attackers to bypass authentication on affected installations of Trend Micro Worry-Free Business Security. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the TempFileName parameter provided to the cgiRecvFile.exe endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Worry-Free Business Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.