Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-11398

CWE-285CWE-5344 documents4 sources
Severity
8.8HIGH
EPSS
5.4%
top 9.93%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 19
Latest updateMay 13

Description

A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an unauthenticated attacker to hijack active user sessions to perform authenticated requests on a vulnerable system.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

🔴Vulnerability Details

2
GHSA
GHSA-gw2x-h452-c92v: A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 32022-05-13
CVEList
CVE-2017-11398: A session hijacking via log disclosure vulnerability in Trend Micro Smart Protection Server (Standalone) versions 32018-01-19

💥Exploits & PoCs

1
Exploit-DB
Trend Micro Smart Protection Server - Session Hijacking / Log File Disclosure / Remote Command Execution / Cron Job Injection / Local File Inclusion / Stored Cross-Site Scripting / Improper Access Con2017-12-19
CVE-2017-11398 (HIGH CVSS 8.8) | A session hijacking via log disclos | cvebase.io