Vulnerabilites related to printerlogic - web_stack
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, son susceptibles a m\u00faltiples vulnerabilidades de tipo cross site scripting reflejadas. La entrada controlada por el atacante es reflejada de nuevo en la p\u00e1gina sin sanearla" } ], "id": "CVE-2021-42639", "lastModified": "2024-11-21T06:27:53.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.507", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, son susceptibles a una vulnerabilidad de Referencia Directa de Objetos No Segura (IDOR), que permite a un atacante no autenticado reasignar los controladores de cualquier impresora" } ], "id": "CVE-2021-42640", "lastModified": "2024-11-21T06:27:53.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-31 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | virtual_appliance | * | |
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
apple | macos | - | |
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:virtual_appliance:*:*:*:*:*:*:*:*", "matchCriteriaId": "2184E016-5FB1-4CD5-89F0-3FA4346BFD76", "versionEndIncluding": "20.0.1304", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, deserializan el atacante controlado, conllevando a una ejecuci\u00f3n de c\u00f3digo remoto pre-autenticado" } ], "id": "CVE-2021-42631", "lastModified": "2024-11-21T06:27:52.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-31T18:15:07.817", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-31 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
apple | macos | - | |
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, usan un valor APP_KEY embebido, conllevando a una ejecuci\u00f3n de c\u00f3digo remoto pre-autenticado" } ], "id": "CVE-2021-42635", "lastModified": "2024-11-21T06:27:53.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-31T18:15:07.870", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-01 23:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
apple | macos | - | |
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, no sanean la entrada del usuario, resultando en una ejecuci\u00f3n de c\u00f3digo remota previo a la autenticaci\u00f3n" } ], "id": "CVE-2021-42638", "lastModified": "2024-11-21T06:27:53.407", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-01T23:15:07.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, son susceptibles a una vulnerabilidad de Referencia Directa de Objetos No Segura (IDOR), que permite a un atacante no autenticado revelar el nombre de usuario y la contrase\u00f1a de la consola en texto plano para una impresora" } ], "id": "CVE-2021-42642", "lastModified": "2024-11-21T06:27:54.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, son susceptibles a una vulnerabilidad de Referencia Directa de Objetos No Segura (IDOR), que permite a un atacante no autenticado revelar el nombre de usuario y la direcci\u00f3n de correo electr\u00f3nico de todos los usuarios" } ], "id": "CVE-2021-42641", "lastModified": "2024-11-21T06:27:53.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.590", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, son vulnerables a una inyecci\u00f3n SQL, que puede permitir a un atacante acceder a registros de auditor\u00eda adicionales" } ], "id": "CVE-2021-42633", "lastModified": "2024-11-21T06:27:52.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.410", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 18:15
Modified
2024-11-21 06:27
Severity ?
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
printerlogic | web_stack | * | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 | |
printerlogic | web_stack | 19.1.1.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7412210-0463-4336-9FAD-E50061806186", "versionEndExcluding": "19.1.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:*", "matchCriteriaId": "A1B7FE83-A6AC-4A16-B0DE-9D1C22AA40FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:*", "matchCriteriaId": "99309983-36D6-47CA-9CBC-32A210C7DF7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:*", "matchCriteriaId": "CBD47013-B42E-4CF1-AF63-AD644B77DFBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:*", "matchCriteriaId": "60152B10-DC40-4132-AF45-52ECFD6782CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability." }, { "lang": "es", "value": "PrinterLogic Web Stack versiones 19.1.1.13 SP9 y anteriores, usan entradas controladas por el usuario para dise\u00f1ar una URL, resultando en una vulnerabilidad de tipo Server Side Request Forgery (SSRF)" } ], "id": "CVE-2021-42637", "lastModified": "2024-11-21T06:27:53.250", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T18:15:07.463", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://printerlogic.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2021-42631 (GCVE-0-2021-42631)
Vulnerability from cvelistv5
Published
2022-01-31 17:48
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-31T17:48:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42631", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42631", "datePublished": "2022-01-31T17:48:05", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42633 (GCVE-0-2021-42633)
Vulnerability from cvelistv5
Published
2022-02-02 17:10
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:10:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42633", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to SQL Injection, which may allow an attacker to access additional audit records." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42633", "datePublished": "2022-02-02T17:10:08", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42640 (GCVE-0-2021-42640)
Vulnerability from cvelistv5
Published
2022-02-02 17:18
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:19:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42640", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42640", "datePublished": "2022-02-02T17:18:46", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42641 (GCVE-0-2021-42641)
Vulnerability from cvelistv5
Published
2022-02-02 17:21
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:21:39", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42641", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42641", "datePublished": "2022-02-02T17:21:27", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42635 (GCVE-0-2021-42635)
Vulnerability from cvelistv5
Published
2022-01-31 17:54
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:50.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-31T17:54:50", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42635", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42635", "datePublished": "2022-01-31T17:54:50", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:50.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42638 (GCVE-0-2021-42638)
Vulnerability from cvelistv5
Published
2022-02-01 22:08
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-01T22:08:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42638", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42638", "datePublished": "2022-02-01T22:08:54", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42642 (GCVE-0-2021-42642)
Vulnerability from cvelistv5
Published
2022-02-02 17:23
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:50.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:23:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42642", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the plaintext console username and password for a printer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42642", "datePublished": "2022-02-02T17:23:01", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:50.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42637 (GCVE-0-2021-42637)
Vulnerability from cvelistv5
Published
2022-02-02 17:14
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:14:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42637", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use user-controlled input to craft a URL, resulting in a Server Side Request Forgery (SSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42637", "datePublished": "2022-02-02T17:14:36", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42639 (GCVE-0-2021-42639)
Vulnerability from cvelistv5
Published
2022-02-02 17:16
Modified
2024-08-04 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.769Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T17:16:55", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://printerlogic.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.printerlogic.com/security-bulletin/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "tags": [ "x_refsource_MISC" ], "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "tags": [ "x_refsource_MISC" ], "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42639", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to multiple reflected cross site scripting vulnerabilities. Attacker controlled input is reflected back in the page without sanitization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://printerlogic.com", "refsource": "MISC", "url": "http://printerlogic.com" }, { "name": "https://www.printerlogic.com/security-bulletin/", "refsource": "CONFIRM", "url": "https://www.printerlogic.com/security-bulletin/" }, { "name": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/", "refsource": "MISC", "url": "https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/" }, { "name": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite", "refsource": "MISC", "url": "https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite" }, { "name": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html", "refsource": "MISC", "url": "https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html" }, { "name": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints", "refsource": "MISC", "url": "https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints" }, { "name": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite", "refsource": "MISC", "url": "https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss\u0026utm_medium=rss\u0026utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42639", "datePublished": "2022-02-02T17:16:40", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }