You are here

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

September 19, 2012 - 6:00am

Addthis

PROBLEM:

Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

PLATFORM:

7.1-Build_Win32_1394; possibly other versions

ABSTRACT:

A vulnerability was reported in Trend Micro InterScan Messaging Security.

reference LINKS:

US CERT Vulnerability Note VU#471364
SecurityTracker Alert ID:  1027544
CVE-2012-2995
CVE-2012-2996
Micro Trend

IMPACT ASSESSMENT:

Medium

Discussion:

Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2012-2995]. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the InterScan Messaging Security software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The 'wrsApprovedURL' parameter in 'addRuleAttrWrsApproveUrl.imss' and the 'src' parameter in 'initUpdSchPage.imss' is affected.

The 'saveAccountSubTab.imss' script does not properly validate user-supplied data [CVE-2012-2996]. A remote user can take actions on the site acting as the target user.

Impact:

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the InterScan Messaging Security software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:

No solution was available at the time of this entry.

Addthis