In Lexmark Services Monitor 2.27.4.0.39 (running on TCP port 2070), a remote attacker can use a directory traversal technique using /../../../ or ..%2F..%2F..%2F to obtain local files on the host operating system.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Nov/17 | Third Party Advisory |
https://www.symantec.com/security-center/vulnerabilities/writeup/110943 | Third Party Advisory |
http://support.lexmark.com/index?page=content&id=TE930&locale=en&userlocale=EN_US |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-11-21 10:15
Updated : 2019-12-19 07:15
NVD link : CVE-2019-16758
Mitre link : CVE-2019-16758
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
lexmark
- services_monitor_firmware
- services_monitor