Not a member of Pastebin yet?
                        Sign Up,
                        it unlocks many cool features!                    
                - Vulnerability type: Directory Traversal
- Vendor of the product: MindManager
- Product: MindManager Windows
- Version: MindManager versions prior to 24.1.150
- Has the vendor confirmed or acknowledged the vulnerability: Yes
- Attack type: Local
- Impact: Other (File Write)
- Affected Components: N/A
- Attack Vectors: To exploit the issue, the victim must open a malicious mmap file, then open a file attachment within said file.
- Suggested Description: In MindManager Windows versions prior to 24.1.150, attackers could potentially write to unexpected directories in victims' machines via directory traversal if victims opened file attachments located in malicious mmap files.
- Discoverer/Credits: Ianis Bernard from NATO Cyber Security Centre (NCSC)
Advertisement
 
                    Add Comment                
                
                        Please, Sign In to add comment                    
                 
                    