CVE-2022-26484
Published Mar 4, 2022
Last updated 3 years ago
Overview
- Description
- An issue was discovered in Veritas InfoScale Operations Manager (VIOM) before 7.4.2 Patch 600 and 8.x before 8.0.0 Patch 100. The web server fails to sanitize admin/cgi-bin/rulemgr.pl/getfile/ input data, allowing a remote authenticated administrator to read arbitrary files on the system via Directory Traversal. By manipulating the resource name in GET requests referring to files with absolute paths, it is possible to access arbitrary files stored on the filesystem, including application source code, configuration files, and critical system files.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDF0DD38-26D9-4850-9A6C-6DA382DB4C6F", "versionEndExcluding": "7.4.2.600" }, { "criteria": "cpe:2.3:a:veritas:infoscale_operations_manager:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18AF1421-EE91-4ADF-9788-4DF3B7C97D2F" } ], "operator": "OR" } ] } ]