An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files.
References
Link | Resource |
---|---|
https://www.veritas.com/content/support/en_US/security/VTS22-002 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-03-04 19:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-26484
Mitre link : CVE-2022-26484
CVE.ORG link : CVE-2022-26484
JSON object : View
Products Affected
veritas
- infoscale_operations_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')