Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows local webserv users to execute arbitrary code with root privileges via a Trojan horse .war file in the Solr webapps directory.
                
            References
                    | Link | Resource | 
|---|---|
| https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory | 
| https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory | 
| https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ | Exploit Technical Description Third Party Advisory | 
| https://success.trendmicro.com/solution/1114913 | Mitigation Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://qkaiser.github.io/pentesting/trendmicro/2016/08/08/trendmicro-sps/ - Exploit, Technical Description, Third Party Advisory | |
| References | () https://success.trendmicro.com/solution/1114913 - Mitigation, Patch, Vendor Advisory | 
Information
                Published : 2017-01-30 22:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-6268
Mitre link : CVE-2016-6268
CVE.ORG link : CVE-2016-6268
JSON object : View
Products Affected
                trendmicro
- smart_protection_server
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
