cve/2024/CVE-2024-51163.md

19 lines
978 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-51163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51163)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
A Local File Inclusion vulnerability in Vegam Solutions Vegam 4i versions 6.3.47.0 and earlier allows a remote attacker to obtain sensitive information through the print label function. Specifically, the filePathList parameter is susceptible to LFI, enabling a malicious user to include files from the web server, such as web.config or /etc/host, leading to the disclosure of sensitive information.
### POC
#### Reference
- https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163
#### Github
No PoCs found on GitHub currently.