An issue exists in Selesta Visual Access Manager (VAM) 4.15.0 up to and including 4.29. A user with valid credentials is able to read XML files on the filesystem via the web interface. The PHP page /common/vam_editXml.php doesn't check the parameter that identifies the file name to be read. Thus, an attacker can manipulate the file name to access a potentially sensitive file within the filesystem.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
seling visual access manager |