Insecure Update Process Allows Arbitrary Code Execution in LightySoft LogMX

Insecure Update Process Allows Arbitrary Code Execution in LightySoft LogMX

CVE-2019-7323 · MEDIUM Severity

AV:N/AC:H/AU:N/C:P/I:P/A:P

GUP (generic update process) in LightySoft LogMX before 7.4.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update. The update process relies on cleartext HTTP. The attacker could replace the LogMXUpdater.class file.

Learn more about our Web Application Penetration Testing UK.