An issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables, as demonstrated by an ISV demo "C:\Windows\System32\calc.exe" entry. An attacker can exploit this to run a malicious binary on startup, or when triggering the Reread/Restart Servers function on the webserver. (Exploitation does not require CVE-2018-15573, because the license file is meant to be changed in the application.)
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html | Exploit Third Party Advisory VDB Entry |
https://reprisesoftware.com/admin/rlm-admin-download.php?&euagree=yes | Patch Product Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-12-13T03:33:19
Updated: 2021-12-13T03:33:19
Reserved: 2021-11-22T00:00:00
Link: CVE-2021-44153
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-12-13T04:15:07.223
Modified: 2021-12-15T15:41:24.567
Link: CVE-2021-44153
JSON object: View
Redhat Information
No data.
CWE