exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

trendmicro.txt

trendmicro.txt
Posted Mar 24, 2004
Authored by Tri Huynh

TrendMicro Interscan Viruswall versions 3.5 and below suffer from a directory traversal vulnerability that allow a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
SHA-256 | f25f638f906ad129cdbb8d328799330facc7b5d94a900c921325721bd2ecf3f8

trendmicro.txt

Change Mirror Download


TrendMicro Interscan Viruswall Directory Traversal
=================================================

PROGRAM: TrendMicro Interscan Viruswall
HOMEPAGE: http://www.trendmicro.com
VULNERABLE VERSIONS: - 3.5x (Windows)
- Unix/Solaris version is
not tested but possibly
vulnerable

DESCRIPTION
=================================================

InterScan VirusWall provides intelligent content scanning
to prevent virus outbreaks. It blocks spam, non-business
related messages, and attachments to protect enterprise
network and business integrity.

DETAILS
=================================================

Interscan Web Viruswall, a part of Interscan Viruswall package, is a web
proxy/gateway service that has a responsibility to scan virus
"on-the-fly" before it reach the user browser. In Interscan
Web Viruswall, there is a builtin mechanism that
allows anybody to read files at the /ishttp/localweb directory by using
such an URL: http://victimIP:8080/ishttpd/localweb/filename. Other URLs
point to
different directories (except sub-directories of "localweb") won't
trigger the
mechanism and will be forwarded to the proxy which the service
is set up to. The reason there such a "feature" is because Interscan
Web Viruswall has another feature (not turned on by default) called
TeleWindow which uses an applet (/ishttpd/localweb/java/telewind.zip)
to allow user to see the scanning process. Unfortunately, that built-in
mini
webserver has a directory traversal problem. By using such an URL like
this,
an evil genius ;-) can access to files outside the
localweb directory:
http://victimIP:8080/ishttpd/localweb/java/?/../../../ishttpd.exe
will download the service executable file or

http://24.128.159.50:8080/ishttpd/localweb/java/?/../../../../../../../../autoexec.bat
will download the autoexec.bat file in the root directory.

WORKAROUND
=================================================
Administrators should be aware that even the TeleWindow feature is not
turned on, the vulnerability can sill be exploited since the
mini-webserver is hardcoded and it can't be turned off by using the
configuration
interface.

Apply the patch from TrendMicro or temporarily stop using the Interscan
Web Viruswall until the patch is issued.

Update: The technical support email virus_doctor@trendmicro.com was
sent an email concern about this problem. However, it has been 6 days
and we haven't received any reponses yet.

CREDITS
=================================================

Discovered by Tri Huynh from SentryUnion


DISLAIMER
=================================================

The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are NO warranties with regard to this information. In no event
shall the author be liable for any damages whatsoever arising out of
or in connection with the use or spread of this information. Any use
of this information is at the user's own risk.


FEEDBACK
=================================================

Please send suggestions, updates, and comments to: trihuynh@zeeup.com


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close