cvelist/2020/28xxx/CVE-2020-28581.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-11-13 20:04:48 +00:00
{
2020-11-18 19:01:58 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@trendmicro.com",
"ID": "CVE-2020-28581",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Trend Micro InterScan Web Security Virtual Appliance",
"version": {
"version_data": [
{
"version_value": "6.5 SP2"
}
]
}
}
]
},
"vendor_name": "Trend Micro"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Authenticated Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://success.trendmicro.com/solution/000281954",
"refsource": "MISC",
"name": "https://success.trendmicro.com/solution/000281954"
},
{
"url": "https://www.tenable.com/security/research/tra-2020-63",
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2020-63"
}
]
}
}