8.8
CVSSv3

CVE-2018-15573

Published: 20/08/2018 Updated: 17/05/2024
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in Reprise License Manager (RLM) up to and including 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf parameter. By default, the web interface is on port 5054, and does not require authentication. NOTE: the vendor has stated "We do not consider this a vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

reprisesoftware reprise license manager

Exploits

Reprise License Manager version 142 suffers from an authenticated remote binary execution vulnerability ...

Mailing Lists

# Product:  Reprise License Manager 142# Vendor:   Reprise Software # CVE ID:   CVE-2021-44153 # Vulnerability Title: Authenticated Remote Binary Execution # Severity: High # Author(s): Mark Staal Steenberg, Bilal El Ghoul, Gionathan Armando Reale, Andreas Fyhn Andersen, Oliver Lind Nordestgaard   # Date:&n ...