CVE-2022-25090

Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kofax:printix:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:51

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://printix.com - Broken Link () http://printix.com - Broken Link
References () https://github.com/ComparedArray/printix-CVE-2022-25090 - Third Party Advisory () https://github.com/ComparedArray/printix-CVE-2022-25090 - Third Party Advisory
References () https://www.exploit-db.com/exploits/50812 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/50812 - Exploit, Third Party Advisory, VDB Entry

03 Sep 2022, 03:55

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html - (MISC) http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html - Third Party Advisory, VDB Entry

10 May 2022, 17:15

Type Values Removed Values Added
References
  • {'url': 'https://printix.net/', 'name': 'https://printix.net/', 'tags': ['Product', 'Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) http://packetstormsecurity.com/files/167012/Printix-1.3.1106.0-Privilege-Escalation.html -

17 Mar 2022, 19:31

Type Values Removed Values Added
CPE cpe:2.3:a:kofax:printix:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 9.3
v3 : 8.1
CWE CWE-362
References
  • (MISC) https://printix.net/ - Product, Vendor Advisory
References (MISC) http://printix.com - (MISC) http://printix.com - Broken Link
References (MISC) http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html - (MISC) http://packetstormsecurity.com/files/166242/Printix-Client-1.3.1106.0-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) https://www.exploit-db.com/exploits/50812 - (MISC) https://www.exploit-db.com/exploits/50812 - Exploit, Third Party Advisory, VDB Entry
References (MISC) https://github.com/ComparedArray/printix-CVE-2022-25090 - (MISC) https://github.com/ComparedArray/printix-CVE-2022-25090 - Third Party Advisory

13 Mar 2022, 18:15

Type Values Removed Values Added
Summary Printix Secure Cloud Print Management 1.3.1035.0 creates a temporary file in directory with insecure permissions. Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary temp.ini file in a directory with insecure permissions, leading to privilege escalation because of a race condition.
References
  • (MISC) https://github.com/ComparedArray/printix-CVE-2022-25090 -

10 Mar 2022, 17:53

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-10 17:47

Updated : 2024-11-21 06:51


NVD link : CVE-2022-25090

Mitre link : CVE-2022-25090

CVE.ORG link : CVE-2022-25090


JSON object : View

Products Affected

kofax

  • printix
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')