In Lexmark Services Monitor 2.27.4.0.39 (running on TCP port 2070), a remote attacker can use a directory traversal technique using /../../../ or ..%2F..%2F..%2F to obtain local files on the host operating system.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/155365/Lexmark-Services-Monitor-2.27.4.0.39-Directory-Traversal.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2019/Nov/17 | third party advisory mailing list |
https://www.symantec.com/security-center/vulnerabilities/writeup/110943 | third party advisory |
http://support.lexmark.com/index?page=content&id=TE930&locale=en&userlocale=EN_US |