First published: Thu Jun 06 2024(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of Trend Micro InterScan Web Security Virtual Appliance. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP Inspection component. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Web Security Suite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-21495 is categorized as critical due to its potential for privilege escalation.
To fix ZDI-CAN-21495, update Trend Micro InterScan Web Security Virtual Appliance to the latest version provided by the vendor.
The HTTP Inspection component is specifically affected by the vulnerability identified as ZDI-CAN-21495.
Yes, ZDI-CAN-21495 requires authentication to exploit the vulnerability.
The impacted product is the Trend Micro InterScan Web Security Virtual Appliance.