This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro InterScan Web Security Virtual Appliance. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Apache Solr application. When parsing the file parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of IWSS user.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Web Security Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-20-678 is classified as a critical vulnerability allowing remote information disclosure.
To remediate ZDI-20-678, apply the latest security patches provided by Trend Micro for the InterScan Web Security Virtual Appliance.
ZDI-20-678 allows remote attackers to exploit the vulnerability without authentication to disclose sensitive information.
ZDI-20-678 affects Trend Micro InterScan Web Security Virtual Appliance installations.
No, ZDI-20-678 can be exploited without requiring authentication.