CVE-2018-18552

ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
Configurations

Configuration 1 (hide)

cpe:2.3:a:serverscheck:monitoring_software:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:56

Type Values Removed Values Added
References () http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt - Exploit, Third Party Advisory () http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/149907/ServersCheck-Monitoring-Software-14.3.3-Arbitrary-File-Write-DoS.html - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-10-24 22:29

Updated : 2024-11-21 03:56


NVD link : CVE-2018-18552

Mitre link : CVE-2018-18552

CVE.ORG link : CVE-2018-18552


JSON object : View

Products Affected

serverscheck

  • monitoring_software
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')