Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mf8r-552p-3grv

Опубликовано: 26 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

EPSS

Процентиль: 94%
0.14521
Средний

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-20
CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
8 месяцев назад

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.

EPSS

Процентиль: 94%
0.14521
Средний

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-20
CWE-22