### [CVE-2023-0587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0587) ![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Apex%20One&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Build%2011110%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=File%20Upload%20Vulnerability&color=brighgreen) ### Description A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed. ### POC #### Reference - https://www.tenable.com/security/research/tra-2023-5 #### Github No PoCs found on GitHub currently.