Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-34205

Опубликовано: 19 сент. 2025
Источник: nvd
CVSS3: 9.8
EPSS Низкий

Описание

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise. This vulnerabilit

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
Версия до 20.0.1923 (исключая)
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
Версия до 22.0.843 (исключая)

EPSS

Процентиль: 92%
0.07419
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-561

Связанные уязвимости

CVSS3: 9.8
github
5 месяцев назад

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise.

CVSS3: 9.8
fstec
5 месяцев назад

Уязвимость программного обеспечения управления, контроля и организации процессов печати Vasion Print Virtual Appliance Host и Print Application, связанная с наличием неиспользуемого кода, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 92%
0.07419
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-561