PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://printerlogic.com - Product | |
References | () https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints - Third Party Advisory | |
References | () https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html - Third Party Advisory | |
References | () https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite - Third Party Advisory | |
References | () https://www.printerlogic.com/security-bulletin/ - Vendor Advisory | |
References | () https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite - Third Party Advisory | |
References | () https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/ - Exploit, Third Party Advisory |
08 Feb 2022, 14:16
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://portswigger.net/daily-swig/printerlogic-vendor-addresses-triple-rce-threat-against-all-connected-endpoints - Third Party Advisory | |
References | (CONFIRM) https://www.printerlogic.com/security-bulletin/ - Vendor Advisory | |
References | (MISC) https://securityaffairs.co/wordpress/127194/security/printerlogic-printer-management-suite-flaws.html - Third Party Advisory | |
References | (MISC) http://printerlogic.com - Product | |
References | (MISC) https://www.securityweek.com/printerlogic-patches-code-execution-flaws-printer-management-suite - Third Party Advisory | |
References | (MISC) https://www.yahooinc.com/paranoids/paranoids-vulnerability-research-printerlogic-issues-security-alert/ - Exploit, Third Party Advisory | |
References | (MISC) https://thecyberthrone.in/2022/01/26/printerlogic-%F0%9F%96%A8-fixes-critical-vulnerabilities-in-its-suite/?utm_source=rss&utm_medium=rss&utm_campaign=printerlogic-%25f0%259f%2596%25a8-fixes-critical-vulnerabilities-in-its-suite - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-668 | |
CPE | cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp3-3:*:*:*:*:*:* cpe:2.3:a:printerlogic:web_stack:*:*:*:*:*:*:*:* cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp9:*:*:*:*:*:* cpe:2.3:a:printerlogic:web_stack:19.1.1.13:-:*:*:*:*:*:* cpe:2.3:a:printerlogic:web_stack:19.1.1.13:sp2:*:*:*:*:*:* |
02 Feb 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-02 18:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42641
Mitre link : CVE-2021-42641
CVE.ORG link : CVE-2021-42641
JSON object : View
Products Affected
printerlogic
- web_stack
CWE
CWE-668
Exposure of Resource to Wrong Sphere