An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files.
References
Link | Resource |
---|---|
https://www.veritas.com/content/support/en_US/security/VTS22-002 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-04 11:15
Updated : 2022-03-11 17:57
NVD link : CVE-2022-26484
Mitre link : CVE-2022-26484
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
veritas
- infoscale_operations_manager