An issue was discovered in Reprise License Manager (RLM) through 12.2BL2. Attackers can use the web interface to read and write data to any file on disk (as long as rlm.exe has access to it) via /goform/edit_lf_process with file content in the lfdata parameter and a pathname in the lf parameter. By default, the web interface is on port 5054, and does not require authentication. NOTE: the vendor has stated "We do not consider this a vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-20T02:00:00
Updated: 2024-08-05T10:01:54.654Z
Reserved: 2018-08-19T00:00:00
Link: CVE-2018-15573
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-08-20T02:29:00.417
Modified: 2024-11-21T03:51:05.737
Link: CVE-2018-15573
Redhat
No data.