| |
Vulnerability CVE-2022-26484
Published: 2022-03-04
Description: |
An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files. |
Type:
CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
CVSS2 => (AV:N/AC:L/Au:S/C:C/I:N/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.8/10 |
6.9/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
None |
None |
References: |
https://www.veritas.com/content/support/en_US/security/VTS22-002
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|