Trend Micro Threat Intelligence Manager Partial Authentication Bypass
A vulnerability was found in the Trend Micro Threat Intelligence Manager (TIM) which allows authentication to be partially bypassed, and allowed access to functionalities restricted only allowed to authenticated users. MWR has discovered two methods to achieve this.
By chaining together other TIM vulnerabilities discovered with this, an unauthenticated attacker can achieve arbitrary PHP code execution.
Description
The Trend Micro Threat Intelligence Manager (TIM) is made up of two web interfaces. One that listens externally on port 80 (PHP), and one that, while listens externally, only allows requests from localhost on port 8080 (JSP). The user would authenticate only to the PHP interface, and the application would then internally forward the authentication request to the JSP interface and assign valid session IDs for both interfaces. Only the PHP interface session ID is exposed to the user in the form of PHPSESSID cookie, whereas the JSP interface session ID is added as a value to your PHP session ID with the key ‘session_key’.
Through the abuse of inbuilt functionality, it was possible to generate a session that appears to be a valid authenticated session for the PHPinterface only, without any information with regards to credentials.
Impact
This allows authentication to be partially bypassed, allowing access to certain functionality that would normally be only allowed to authenticated users.
However, an unauthenticated attacker can achieve arbitrary PHP code execution by chaining other TIM vulnerabilities discovered together with this vulnerability, in this sequence:
Solution
It is recommended that access to the management interface of Trend Micro’s Threat Intelligence Manager is heavily restricted as no patch is/will be available.
Trend Micro’s official response to this vulnerability can be found as follows:
“Thank you for your patience and continuously working with the Trend Micro Vulnerability Response team.
The Trend Micro Threat Intelligence Manager (TIM) has reached its end-of-life, and unfortunately addressing the vulnerabilities you submitted would require substantial efforts to re-architect or build an entirely new product. We strongly recommend ourTIM customers to contact sales for further options on a suitable replacement if this is a concern for them.”
Technical Details
Refer to attached detailed advisory above.