vendor:
KevinLAB BEMS
by:
LiquidWorm
5.5
CVSS
MEDIUM
File Path Traversal Information Disclosure
22
CWE
Product Name: KevinLAB BEMS
Affected Version From: 4ST L-BEMS 1.0.0
Affected Version To: 4ST L-BEMS 1.0.0
Patch Exists: NO
Related CWE:
CPE: a:kevinlab_inc.:kevinlab_bems:1.0.0
Platforms Tested: Linux CentOS 7, Apache 2.4.6, Python 2.7.5, PHP 5.4.16, MariaDB 5.5.68
2021
KevinLAB BEMS 1.0 – File Path Traversal Information Disclosure (Authenticated)
The BEMS suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the 'page' GET parameter in index.php is not properly verified before being used to include files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
Mitigation:
To mitigate this vulnerability, ensure that input passed to file inclusion functions is properly validated and sanitized. Implement proper input validation and restrict access to sensitive files.