First published: Thu Aug 13 2015(Updated: )
Directory traversal vulnerability in opm/read_sessionlog.php in Xceedium Xsuite 2.4.4.5 and earlier allows remote attackers to read arbitrary files via a ....// (quadruple dot double slash) in the logFile parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xceedium Xsuite | =2.3.0 | |
Xceedium Xsuite | =2.4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4666 is considered a medium severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2015-4666, upgrade to a patched version of Xceedium Xsuite that is not vulnerable to this directory traversal attack.
CVE-2015-4666 affects Xceedium Xsuite versions 2.4.4.5 and earlier, including 2.3.0 and 2.4.3.0.
CVE-2015-4666 enables remote attackers to perform a directory traversal attack, allowing them to read arbitrary files on the server.
Yes, CVE-2015-4666 can be exploited without authentication, making it particularly concerning for web applications.