Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Trend Micro Apex One fcgiOfcDDA.exe File Upload Vulnerability

High

Synopsis

A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.

POC Execution:
python3 tm_apex_one_fcgiOfcDDA_file_upload.py -t  -p 4343 -c 10 -s 10000000

Writing 10000000 bytes to file 8NXLKQKJB4ROI9UU in the SampleSubmission directory...
Writing 10000000 bytes to file FOFD3HKRNY2BV2KO in the SampleSubmission directory...
Writing 10000000 bytes to file JG55KLYLG4CVQ3YT in the SampleSubmission directory...
Writing 10000000 bytes to file LHLC71DX5ZQBK3PL in the SampleSubmission directory...
Writing 10000000 bytes to file KTGNIRE0SRSBEBX5 in the SampleSubmission directory...
Writing 10000000 bytes to file AWBPQKSBE7IGT2H0 in the SampleSubmission directory...
Writing 10000000 bytes to file ZHPZ4NWUHJJ2ROLC in the SampleSubmission directory...
Writing 10000000 bytes to file Q8DZU5SI4YYDC1KJ in the SampleSubmission directory...
Writing 10000000 bytes to file P5FEQIV12FM6AB0I in the SampleSubmission directory...
Writing 10000000 bytes to file XBRMAAIMVIU8ZFVW in the SampleSubmission directory...

Please check contents in \PCCSRV\TEMP\SampleSubmission\

Solution

Upgrade to service pack 11564.

Disclosure Timeline

10/18/2022 - Vulnerability discovered
10/21/2022 - Vulnerability reported.
10/25/2022 - Vendor requests PoC.
10/26/2022 - Tenable sends PoC.
01/27/2023 - Vendor informs Tenable of patch.
01/30/2023 - Advisory released.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

CVE ID: CVE-2023-0587
Tenable Advisory ID: TRA-2023-5
CVSSv3 Base / Temporal Score:
8.2/7.4
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
Trend Micro Apex One Server Build 11110.
Risk Factor:
High

Advisory Timeline

1/30/2023 - Published