
Cloud Vulnerability DB
A community-led vulnerabilities database
A directory traversal vulnerability was discovered in Lansweeper version 10.1.1.0, identified as CVE-2022-27498. The vulnerability exists in the TicketTemplateActions.aspx GetTemplateAttachment functionality, which allows an attacker to read arbitrary files on the server through specially crafted HTTP requests (Talos Blog).
The vulnerability is located in the \LS\CF\Helpdesk\TicketTemplateActions.cs file and is related to the ticket template editing functionality. The issue stems from insufficient sanitization of the 'fileuid' parameter, which allows attackers to traverse directories using path traversal sequences. The vulnerability has been assigned a CVSSv3 score of 9.1 (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) and is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) (Talos Intelligence).
The vulnerability allows attackers to read arbitrary files on the affected server by exploiting the directory traversal weakness. This could lead to unauthorized access to sensitive system files and potential exposure of confidential information (Talos Intelligence).
Lansweeper has released a patch to address this vulnerability. Users are strongly encouraged to update their Lansweeper installations to a version newer than 10.1.1.0. Additionally, Snort rules 59990-59992, 59999-60000, 60001-60002, 60054-60056, 60142-60144, and 60219 have been released to detect exploitation attempts (Talos Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."