Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html | Third Party Advisory VDB Entry |
http://printix.com | Broken Link |
https://github.com/ComparedArray/printix-CVE-2022-25090 | Third Party Advisory |
https://www.exploit-db.com/exploits/50812 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2022-03-10 17:47
Updated : 2022-09-03 03:55
NVD link : CVE-2022-25090
Mitre link : CVE-2022-25090
CVE.ORG link : CVE-2022-25090
JSON object : View
Products Affected
kofax
- printix
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')