First published: Wed Jan 10 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex Central. Authentication is required to exploit this vulnerability. The specific flaw exists within the getObjWGFServiceApiByApiName function. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of IUSR.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Apex Central |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-21327 is considered critical due to the potential for remote code execution.
To fix ZDI-CAN-21327, apply the latest security updates provided by Trend Micro for Apex Central.
ZDI-CAN-21327 affects installations of Trend Micro Apex Central that are exposed to the vulnerability.
Attackers can execute arbitrary code on affected installations of Trend Micro Apex Central, requiring authentication to exploit the vulnerability.
Yes, authentication is required to exploit the vulnerability identified by ZDI-CAN-21327.