Vulnerability Description
The handle_certificate function in /vmi/manager/engine/management/commands/apns_worker.py in Trend Micro Virtual Mobile Infrastructure before 5.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the password to api/v1/cfg/oauth/save_identify_pfx/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Virtual Mobile Infrastructure | 5.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95884Third Party AdvisoryVDB Entry
- https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ExploitTechnical DescriptionThird Party Advisory
- https://success.trendmicro.com/solution/1115411Vendor Advisory
- http://www.securityfocus.com/bid/95884Third Party AdvisoryVDB Entry
- https://qkaiser.github.io/pentesting/trendmicro/2016/10/08/trendmicro-vmi/ExploitTechnical DescriptionThird Party Advisory
- https://success.trendmicro.com/solution/1115411Vendor Advisory
FAQ
What is CVE-2016-6270?
CVE-2016-6270 is a vulnerability with a CVSS score of 8.8 (HIGH). The handle_certificate function in /vmi/manager/engine/management/commands/apns_worker.py in Trend Micro Virtual Mobile Infrastructure before 5.1 allows remote authenticated users to execute arbitrary...
How severe is CVE-2016-6270?
CVE-2016-6270 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6270?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Virtual Mobile Infrastructure.