CVE-2023-47251

In mprivacy-tools before 2.0.406g in m-privacy TightGate-Pro Server, a Directory Traversal in the print function of the VNC service allows authenticated attackers (with access to a VNC session) to automatically transfer malicious PDF documents by moving them into the .spool directory, and then sending a signal to the VNC service, which automatically transfers them to the connected VNC client's filesystem.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:m-privacy:mprivacy-tools:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:tightgatevnc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:30

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory
References () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory
References () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product

30 Nov 2023, 20:49

Type Values Removed Values Added
CPE cpe:2.3:a:m-privacy:tightgatevnc:*:*:*:*:*:*:*:*
cpe:2.3:a:m-privacy:mprivacy-tools:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
References () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - () https://www.m-privacy.de/en/tightgate-pro-safe-surfing/ - Product
References () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - () https://sec-consult.com/en/vulnerability-lab/advisories/index.html - Third Party Advisory
References () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - () https://sec-consult.com/vulnerability-lab/advisory/multiple-vulnerabilities-in-m-privacy-tightgate-pro/ - Third Party Advisory
References () http://seclists.org/fulldisclosure/2023/Nov/13 - () http://seclists.org/fulldisclosure/2023/Nov/13 - Exploit, Mailing List, Third Party Advisory
CWE CWE-22
First Time M-privacy
M-privacy mprivacy-tools
M-privacy tightgatevnc

28 Nov 2023, 17:15

Type Values Removed Values Added
References
  • () http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html -

27 Nov 2023, 22:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2023/Nov/13 -

22 Nov 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-22 18:15

Updated : 2024-11-21 08:30


NVD link : CVE-2023-47251

Mitre link : CVE-2023-47251

CVE.ORG link : CVE-2023-47251


JSON object : View

Products Affected

m-privacy

  • tightgatevnc
  • mprivacy-tools
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')