An issue was discovered in Reprise License Manager 11.0. This vulnerability is a Path Traversal where the attacker, by changing a field in the Web Request, can have access to files on the File System of the Server. By specifying a pathname in the POST parameter "lf" to the goform/edit_lf_get_data URI, the attacker can retrieve the content of a file.
References
Link | Resource |
---|---|
http://www.0x90.zone/web/path-traversal/2018/02/16/Path-Traversal-Reprise-LM.html | Exploit Third Party Advisory |
http://www.0x90.zone/web/path-traversal/2018/02/16/Path-Traversal-Reprise-LM.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.0x90.zone/web/path-traversal/2018/02/16/Path-Traversal-Reprise-LM.html - Exploit, Third Party Advisory |
Information
Published : 2018-02-21 15:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5716
Mitre link : CVE-2018-5716
CVE.ORG link : CVE-2018-5716
JSON object : View
Products Affected
reprisesoftware
- reprise_license_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')