CVE-2023-40506 – LG Simple Editor copyContent XML External Entity Processing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2023-40506
LG Simple Editor copyContent XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the copyContent command. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. • https://www.zerodayinitiative.com/advisories/ZDI-23-1210 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2023-40503 – LG Simple Editor saveXmlFile XML External Entity Processing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2023-40503
LG Simple Editor saveXmlFile XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the saveXmlFile method. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. • https://www.zerodayinitiative.com/advisories/ZDI-23-1207 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2023-40511 – LG Simple Editor checkServer Authentication Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2023-40511
LG Simple Editor checkServer Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the checkServer method. The issue results from the exposure of plaintext credentials. An attacker can leverage this vulnerability to bypass authentication on the system. • https://www.zerodayinitiative.com/advisories/ZDI-23-1215 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-40492 – LG Simple Editor deleteCheckSession Directory Traversal Arbitrary File Deletion Vulnerability
https://notcve.org/view.php?id=CVE-2023-40492
LG Simple Editor deleteCheckSession Directory Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the deleteCheckSession method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of SYSTEM. • https://www.zerodayinitiative.com/advisories/ZDI-23-1198 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2023-40493 – LG Simple Editor copySessionFolder Directory Traversal Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-40493
LG Simple Editor copySessionFolder Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the copySessionFolder command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.zerodayinitiative.com/advisories/ZDI-23-1199 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •