header-logo
Suggest Exploit
vendor:
Interscan Viruswall
by:
Unknown
7.5
CVSS
HIGH
Remote Authentication Bypass
287
CWE
Product Name: Interscan Viruswall
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE not available
CPE: a:trend_micro:interscan_viruswall
Metasploit: https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-3341/https://www.rapid7.com/db/vulnerabilities/suse-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/mfsa2023-36-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/mozilla-thunderbird-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/mfsa2023-34-cve-2023-4583/https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40164/https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40166/https://www.rapid7.com/db/vulnerabilities/notepadplusplus-cve-2023-40036/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38205/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38206/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38204/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-38203/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29298/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29301/https://www.rapid7.com/db/vulnerabilities/adobe-coldfusion-cve-2023-29300/https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2023-34095/https://www.rapid7.com/db/?q=CVE+not+available&type=&page=2https://www.rapid7.com/db/?q=CVE+not+available&type=&page=3https://www.rapid7.com/db/?q=CVE+not+available&type=&page=4https://www.rapid7.com/db/?q=CVE+not+available&type=&page=2
Other Scripts:
Platforms Tested:
Unknown

Remote Authentication Bypass in Interscan Viruswall

A remote user could utilize the administrator functions of Interscan Viruswall without providing authentication credentials. This may allow the user to make configuration changes when submitting specially crafted URLs to the host.

Mitigation:

Vendor recommends upgrading to the latest version or applying a patch.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2859/info

A remote user could utilize the administrator functions of Interscan Viruswall without providing authentication credentials. This may allow the user to make configuration changes when submitting specially crafted URLs to the host. 

http://VirusWall/interscan/cgi-bin/interscan.dll