High severity8.8NVD Advisory· Published Aug 3, 2017· Updated May 13, 2026
CVE-2017-11391
CVE-2017-11391
Description
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744.
Affected products
3cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:*:*:*:*:*:*:*
- Trend Micro/Trend Micro InterScan Messaging Security Virtual Appliancev5Range: 9.0,9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/100075nvdThird Party AdvisoryVDB Entry
- www.zerodayinitiative.com/advisories/ZDI-17-502nvdThird Party AdvisoryVDB Entry
- success.trendmicro.com/solution/1117723nvdVendor Advisory
News mentions
0No linked articles in our index yet.