[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/TRENDMICRO-DDI-CSRF.txt Vendor: ==================== www.trendmicro.com Product: ========================================= Trend Micro Deep Discovery Inspector V3.8, 3.7 Deep Discovery Inspector is a network appliance that gives you 360-degree network monitoring of all traffic to detect all aspects of a targeted attack. Vulnerability Type: ================================ Cross Site Request Forgery - CSRF CVE Reference: ============== N/A Vulnerability Details: ================================ Trend Micro Deep Discovery suffers from multiple CSRF vectors, if an authenticated user visits an malicious webpage attackers will have ability to modify many settings of the Deep Discovery application to that of the attackers choosing. Reference: http://esupport.trendmicro.com/solution/en-US/1113708.aspx Trend Micro DDI is affected by CSRF vulnerabilities. These affect the following console features: Deny List Notifications Detection Rules Threat Detections Email Settings Network Blacklisting/Whitelisting Time Accounts Power Off / Restart DETAILS The following DDI versions prior to version 3.8 Service Pack 2 (SP2) are affected: 3.8 English 3.8 Japanese 3.7 English 3.7 Japanese 3.7 Simplified Chinese Trend Micro has released DDI 3.8 SP2. All versions up to version 3.8 SP1 must upgrade to version 3.8 SP2 (Build 3.82.1133) to address this issue. Exploit code(s): =============== 1) Shut down all threat scans and malicious file submissions under: Administration /Monitoring / Scanning / Threat Detections
2) Whitelist C&C server menu location: Detections / C&C Callback Addresses
3) Turn off or change email notifications
4) Change system settings ( x.x.x.x = whatever IP we want )
Disclosure Timeline: ======================================= Vendor Notification: November 23, 2015 March 25, 2016 : Public Disclosure Exploitation Technique: ======================= Remote Severity Level: ================ High Description: ======================================================================== Request Method(s): [+] POST Vulnerable Product: [+] Trend Micro Deep Discovery Inspector V3.8 ======================================================================== [+] Disclaimer Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere. by hyp3rlinx # Iranian Exploit DataBase = http://IeDb.Ir [2016-03-27]