cve/2023/CVE-2023-0587.md

18 lines
1015 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0587)
![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Apex%20One&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Build%2011110%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=File%20Upload%20Vulnerability&color=brighgreen)
### Description
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2023-5
#### Github
No PoCs found on GitHub currently.