An issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables, as demonstrated by an ISV demo "C:\Windows\System32\calc.exe" entry. An attacker can exploit this to run a malicious binary on startup, or when triggering the Reread/Restart Servers function on the webserver. (Exploitation does not require CVE-2018-15573, because the license file is meant to be changed in the application.)
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165194/Reprise-License-Manager-14.2-Remote-Binary-Execution.html | Exploit Third Party Advisory VDB Entry |
https://reprisesoftware.com/admin/rlm-admin-download.php?&euagree=yes | Patch Product Vendor Advisory |
Configurations
Information
Published : 2021-12-12 20:15
Updated : 2021-12-15 07:41
NVD link : CVE-2021-44153
Mitre link : CVE-2021-44153
JSON object : View
CWE
Products Affected
reprisesoftware
- reprise_license_manager