Skip to Content Information Center
Markvision Enterprise

Markvision Enterprise

Markvision Enterprise: Input Sanitization Vulnerability Security Advisory

Lexmark Security Advisory:

Revision: 1.0 Last update: 26-January-2015 Public Release Date: 9-Feburary-2015

Summary

Input Sanitization vulnerability

Markvision Enterprise contains a vulnerability that allows uploaded ZIP files to be unpacked into arbitrary locations.

References

CVE: CVE-2014-9375

Details

Markvision Enterprise contains a servlet named “LibraryFileUploadServlet”. This servlet allows an authenticated user to upload ZIP files that, when unpacked, can use directory traversal to write files in arbitrary locations on the Markvision Enterprise server, including the ability to upload and execute code with the privilege of the Markvision Enterprise application.

Impact

Successful exploitation of this vulnerability can lead to the disclosure of data stored in Markvision Enterprise, and the ability to execute code within the Markvision platform. Vulnerability Scoring Details

Vulnerability Scoring Details

CVSS Base Score:9.0
Impact Subscore: 10
Exploitability Subscore:8.0

Exploitability:

Impact:

Access Vector: NetworkConfidentiality: Complete
Access Complexity: LowLow Integrity: Complete
Authentication: SingleAvailability: Complete

CVSS scores are calculated in accordance with CVSS version 2.0 (http://www.first.org/cvss/cvss-guide.html).

Impact

This vulnerability can be used to expose a portion of SSLv3 protected communications. This information can include session cookies which can then be leveraged to obtain unauthorized access.

Workarounds

Lexmark recommends updating the application if you have a vulnerable version.

Please visit http://www.lexmark.com/markvision or contact the Lexmark Technical Support Center at 1-800-539-6275 for additional information.

Exploitation and Public Announcements

Lexmark is not aware of any malicious use of the vulnerability described in this advisory.

Lexmark would like to thank rgod working with HP's Zero day Initiative (ZDI) for bringing this issue to our attention.

Distribution

This advisory is posted on Lexmark’s web site at http://support.lexmark.com/alerts. Future updates to this document will be posted on Lexmark’s web site at the same location.

Revision History

RevisionDateReason
1.0 26 – January – 2015 Initial Public Release

LEGACY ID: TE677

Byl tento článek užitečný?
Top