ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-10-24 22:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-18552
Mitre link : CVE-2018-18552
CVE.ORG link : CVE-2018-18552
JSON object : View
Products Affected
serverscheck
- monitoring_software
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')