Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://printix.com | broken link |
https://www.exploit-db.com/exploits/50812 | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html | exploit vdb entry third party advisory |
https://github.com/ComparedArray/printix-CVE-2022-25090 | third party advisory |
http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html | vdb entry third party advisory |