Medium severity5.4NVD Advisory· Published Apr 5, 2017· Updated May 13, 2026
CVE-2017-6340
CVE-2017-6340
Description
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 does not sanitize a rest/commonlog/report/template name field, which allows a 'Reports Only' user to inject malicious JavaScript while creating a new report. Additionally, IWSVA implements incorrect access control that allows any authenticated, remote user (even with low privileges like 'Auditor') to create or modify reports, and consequently take advantage of this XSS vulnerability. The JavaScript is executed when victims visit reports or auditlog pages.
Affected products
1- cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:*:*:*:*:*:*:*:*Range: <=6.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- success.trendmicro.com/solution/1116960nvdPatchVendor Advisory
- www.qualys.com/2017/01/12/qsa-2017-01-12/qsa-2017-01-12.pdfnvdExploitTechnical DescriptionThird Party Advisory
- www.securityfocus.com/bid/97487nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.