This vulnerability allows remote attackers to execute arbitrary SQL statements on vulnerable installations of Trend Micro Encryption for Email Gateway. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the formRequestDomains class. When parsing the hidDomains parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Encryption for Email |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-5592 is classified as a critical vulnerability due to its potential to allow remote SQL injection attacks.
To fix ZDI-CAN-5592, apply the latest security updates provided by Trend Micro for Encryption for Email Gateway.
ZDI-CAN-5592 affects installations of Trend Micro Encryption for Email Gateway with vulnerable configurations.
The potential impacts of ZDI-CAN-5592 include unauthorized data access and manipulation through SQL injection.
Yes, authentication is required to exploit ZDI-CAN-5592, but it can be bypassed due to weaknesses in the authentication mechanism.