Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4429

Опубликовано: 19 мая 2014
Источник: debian
EPSS Низкий

Описание

Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly restrict access to artefacts, which allows remote authenticated users to read arbitrary artefacts via the (1) artefact id in an upload action when creating a journal or (2) instconf_artefactid_selected[ID] parameter in an upload action when editing a block.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mahararemovedpackage
maharano-dsasqueezepackage

Примечания

  • https://bazaar.launchpad.net/~mahara-release/mahara/1.7_STABLE/revision/5833

  • https://bazaar.launchpad.net/~mahara-release/mahara/1.5_STABLE/revision/5543

  • https://bugs.launchpad.net/mahara/+bug/1211758

EPSS

Процентиль: 48%
0.00251
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly restrict access to artefacts, which allows remote authenticated users to read arbitrary artefacts via the (1) artefact id in an upload action when creating a journal or (2) instconf_artefactid_selected[ID] parameter in an upload action when editing a block.

nvd
больше 11 лет назад

Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly restrict access to artefacts, which allows remote authenticated users to read arbitrary artefacts via the (1) artefact id in an upload action when creating a journal or (2) instconf_artefactid_selected[ID] parameter in an upload action when editing a block.

github
больше 3 лет назад

Mahara before 1.5.12, 1.6.x before 1.6.7, and 1.7.x before 1.7.3 does not properly restrict access to artefacts, which allows remote authenticated users to read arbitrary artefacts via the (1) artefact id in an upload action when creating a journal or (2) instconf_artefactid_selected[ID] parameter in an upload action when editing a block.

EPSS

Процентиль: 48%
0.00251
Низкий