Lucene search

K
githubGitHub Advisory DatabaseGHSA-GPHJ-63H8-R9VQ
HistoryMay 13, 2022 - 1:12 a.m.

Moodle directory traversal vulnerability

2022-05-1301:12:45
CWE-22
GitHub Advisory Database
github.com
4
moodle
directory traversal
configonlylib.php
vulnerability
remote authenticated users
php scripts
arbitrary files

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0.002

Percentile

54.9%

Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a … (dot dot) in the file parameter, as demonstrated by reading PHP scripts.

Affected configurations

Vulners
Node
moodlemoodleRange2.8.02.8.3
OR
moodlemoodleRange2.7.02.7.5
OR
moodlemoodleRange<2.6.8
VendorProductVersionCPE
moodlemoodle*cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

AI Score

6.4

Confidence

Low

EPSS

0.002

Percentile

54.9%