Synopsis
Unauthenticated Path Traversal
Trend Micro's Worry-Free Business Security (WFBS) version 10.0, build 2228 and below are vulnerable to an unauthenticated path traversal allowing for remote file deletion. The specific flaw exists within the ErrorRemoveLogTempFile function in cgiLog.exe when handling of the BinaryDataBlock parameter provided to the /officescan/cgi/cgiLog.exe endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in a file deletion operation. An unauthenticated remote attacker can exploit the vulnerability to delete arbitrary files using the CURL command provided in the PoC section of this advisory. The file deletion operation runs under the security context of the user account running the WFBS web server. WFBS can install and use Apache as its web server, which runs under the Local System account by default.
Solution
Update to Trend Micro Worry-Free Business Security 10 SP1 Patch 2260.Proof of Concept
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]