CVE-2025-34205 (CNNVD-202509-3073)
中文标题:
Vasion Print Virtual Appliance Host和Vasion Print Application 安全漏洞
英文标题:
Vasion Print (formerly PrinterLogic) Dangerous PHP Dead Code Enables RCE
漏洞描述
中文描述:
Vasion Print Virtual Appliance Host和Vasion Print Application都是美国Vasion公司的产品。Vasion Print Virtual Appliance Host是一个打印管理软件。Vasion Print Application是一个打印机管理应用程序。 Vasion Print Virtual Appliance Host 22.0.843之前版本和Vasion Print Application 20.0.1923版本存在安全漏洞,该漏洞源于/var/www/app/resetroot.php缺少身份验证检查,可能导致数据库控制权获取,以及/var/www/app/lib/common/oses.php中存在反序列化问题,可能导致远程代码执行。
英文描述:
Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise. This vulnerability has been identified by the vendor as: V-2023-003 — Dead / Insecure PHP Code.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host | - | < 22.0.843 | - |
cpe:2.3:a:vasion:print_virtual_appliance_host:*:*:*:*:*:*:*:*
|
| Vasion | Print Application | - | < 20.0.1923 | - |
cpe:2.3:a:vasion:print_application:*:*:*:*:*:*:*:*
|
| vasion | virtual_appliance_application | * | - | - |
cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*
|
| vasion | virtual_appliance_host | * | - | - |
cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
CRITICALCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-34205 |
2025-11-11 15:23:17 | 2025-11-11 07:40:25 |
| NVD | nvd_CVE-2025-34205 |
2025-11-11 15:01:03 | 2025-11-11 07:48:15 |
| CNNVD | cnnvd_CNNVD-202509-3073 |
2025-11-11 15:12:58 | 2025-11-11 08:00:12 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202509-3073
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 2 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']