A malicious user can cause log files to be written to a directory that they do not have permission to write to.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Workspace | Citrix | * | 2212 (excluding) |
Workspace | Citrix | 1912 (including) | 1912 (including) |
Workspace | Citrix | 1912-cu1 (including) | 1912-cu1 (including) |
Workspace | Citrix | 1912-cu1-hf1 (including) | 1912-cu1-hf1 (including) |
Workspace | Citrix | 1912-cu2 (including) | 1912-cu2 (including) |
Workspace | Citrix | 1912-cu3 (including) | 1912-cu3 (including) |
Workspace | Citrix | 1912-cu4 (including) | 1912-cu4 (including) |
Workspace | Citrix | 1912-cu5 (including) | 1912-cu5 (including) |
Workspace | Citrix | 1912-cu6 (including) | 1912-cu6 (including) |
Workspace | Citrix | 2203.1 (including) | 2203.1 (including) |
Workspace | Citrix | 2203.1-cu1 (including) | 2203.1-cu1 (including) |