airVision contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the views/file.php script not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'path' parameter. This directory traversal attack would allow the attacker to gain access to arbitrary files.
Remote / Network Access
Loss of Confidentiality
OSVDB is not aware of a solution for this vulnerability.