Nagvis before 1.9.34 was discovered to contain an arbitrary file read vulnerability via the component /core/classes/NagVisHoverUrl.php.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/NagVis/nagvis/commit/71aba7f46f79d846e1df037f165d206a2cd1d22a | patch |
https://github.com/NagVis/nagvis/compare/nagvis-1.9.33...nagvis-1.9.34 | product patch |
https://www.sonarsource.com/blog/checkmk-rce-chain-3/ | third party advisory exploit |