An issue was discovered in Reprise License Manager 11.0. This vulnerability is a Path Traversal where the attacker, by changing a field in the Web Request, can have access to files on the File System of the Server. By specifying a pathname in the POST parameter "lf" to the goform/edit_lf_get_data URI, the attacker can retrieve the content of a file.
History

Wed, 30 Apr 2025 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:reprisesoftware:reprise_license_manager:11.0:*:*:*:*:*:*:* cpe:2.3:a:reprisesoftware:reprise_license_manager:*:*:*:*:*:*:*:*
Metrics cvssV3_0

{'score': 8.1, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-02-21T15:00:00

Updated: 2024-08-05T05:40:51.356Z

Reserved: 2018-01-16T00:00:00

Link: CVE-2018-5716

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2018-02-21T15:29:00.633

Modified: 2025-04-30T21:02:42.937

Link: CVE-2018-5716

cve-icon Redhat

No data.