Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Vulnerability type: Directory Traversal
- Vendor of the product: MindManager
- Product: MindManager Windows
- Version: MindManager versions prior to 24.1.150
- Has the vendor confirmed or acknowledged the vulnerability: Yes
- Attack type: Local
- Impact: Other (File Write)
- Affected Components: N/A
- Attack Vectors: To exploit the issue, the victim must open a malicious mmap file, then open a file attachment within said file.
- Suggested Description: In MindManager Windows versions prior to 24.1.150, attackers could potentially write to unexpected directories in victims' machines via directory traversal if victims opened file attachments located in malicious mmap files.
- Discoverer/Credits: Ianis Bernard from NATO Cyber Security Centre (NCSC)
Advertisement