Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files via a ....// (quadruple dot double slash) in the logFile parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/132809/Xceedium-Xsuite-Command-Injection-XSS-Traversal-Escalation.html - Exploit | |
References | () http://www.modzero.ch/advisories/MZ-15-02-Xceedium-Xsuite.txt - Exploit | |
References | () https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180614-01--security-notice-for-ca-privileged-access-manager.html - | |
References | () https://www.exploit-db.com/exploits/37708/ - |
Information
Published : 2015-08-13 14:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4666
Mitre link : CVE-2015-4666
CVE.ORG link : CVE-2015-4666
JSON object : View
Products Affected
xceedium
- xsuite
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')