Lucene search

K
packetstormAndreas Fyhn Andersen, Mark Staal Steenberg, Oliver Lind Nordestgaard, Gionathan Armando Reale, Bilal El GhoulPACKETSTORM:165194
HistoryDec 08, 2021 - 12:00 a.m.

Reprise License Manager 14.2 Remote Binary Execution

2021-12-0800:00:00
Andreas Fyhn Andersen, Mark Staal Steenberg, Oliver Lind Nordestgaard, Gionathan Armando Reale, Bilal El Ghoul
packetstormsecurity.com
271

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

`# Product: Reprise License Manager 14.2  
# Vendor: Reprise Software  
# CVE ID: CVE-2021-44153  
# Vulnerability Title: Authenticated Remote Binary Execution  
# Severity: High  
# Author(s): Mark Staal Steenberg, Bilal El Ghoul, Gionathan Armando Reale, Andreas Fyhn Andersen, Oliver Lind Nordestgaard   
# Date: 2021-11-25  
#############################################################  
  
Introduction:  
  
When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables.  
An attacker can exploit this to run a malicious binary on startup, or when triggering the "Reread/Restart Servers" function on the webserver. (Exploitation does not require CVE-2018-15573, because the license file is meant to be changed in the application.)  
  
Vulnerability:  
  
A license file containing the following, would execute calc.exe as an example of this vulnerability, it is also possible to provide arguments to the executables:  
  
ISV demo "C:\Windows\System32\calc.exe"  
  
If CVE-2018-15573 remains unpatched, files could be created on the system and then executed.   
  
Recommendation:  
Don't allow user-specified binaries to be run. Use a allow-list if absolutely required.  
  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Related for PACKETSTORM:165194