Description
An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf parameter. By default, the web interface is on port 5054, and does not require authentication. NOTE: the vendor has stated "We do not consider this a vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:01:54.654Z
Reserved: 2018-08-19T00:00:00.000Z
Link: CVE-2018-15573
No data.
Status : Analyzed
Published: 2018-08-20T02:29:00.417
Modified: 2025-04-30T21:02:28.613
Link: CVE-2018-15573
No data.
OpenCVE Enrichment
No data.
Weaknesses