An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. A user with valid credentials is able to read XML files on the filesystem via the web interface. The PHP page /common/vam_editXml.php doesn't check the parameter that identifies the file name to be read. Thus, an attacker can manipulate the file name to access a potentially sensitive file within the filesystem.
References
Link | Resource |
---|---|
https://www.telecomitalia.com/tit/it/innovazione/cybersecurity/red-team.html | Exploit Third Party Advisory |
https://www.seling.it/product/vam/ | Product Vendor Advisory |
https://www.seling.it/ | Product |
Configurations
Information
Published : 2020-02-26 08:15
Updated : 2021-07-21 04:39
NVD link : CVE-2019-19992
Mitre link : CVE-2019-19992
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
seling
- visual_access_manager